Surviving Attacks in Challenged Networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Surviving Information Warfare Attacks

T he past few years have seen governmental, military, and commercial organizations widely adopt Web-based commercial tech­ nologies because of their convenience, ease of use, and ability to take advantage of rapid advances in the commercial market. With this increas­ ing reliance on internetworked computer resources comes an increasing vulnerability to information warfare. Although it can range...

متن کامل

surviving DDoS attacks

ka n d u l a @ M IT. E D U C O N S I D E R T H E F O L L O W I N G S C E N A R I O : Alyssa Hacker subverts tens of thousands of machines by using a worm and then uses these zombies to mount a distributed denial of service attack on a Web server. Alyssa’s zombies do not launch a SYN flood or issue dummy packets that will only congest the Web server’s access link. Instead, the zombies fetch file...

متن کامل

Surviving information warfare attacks on databases

We consider the problem of surviving information warfare attacks on databases. We adopt a fault tolerance approach to the different phases of an attack. To maintain precise information about the attack, we mark data to reflect the severity of detected damage as well as the degree to which the damaged data has been repaired. In the case of partially repaired data, integrity constraints might be ...

متن کامل

Opportunistic Forwarding in Challenged Networks

LEE, CHUL-HO. Design and Analysis of Opportunistic Forwarding in Challenged Networks. (Under the direction of Dr. Do Young Eun.) Challenged networks are those networks, e.g., mobile opportunistic networks (MONs), a.k.a., delay/disruption tolerant networks, and power-constrained or duty-cycled wireless sensor networks (WSNs), where traditional Internet architectures fail to ensure end-to-end com...

متن کامل

Special Section on Challenged Networks

s p l t a It is our great pleasure to introduce this Special Section of the Journal, presenting advanced solutions for mobile challenged networks. The special section collects extended papers from the 9th ACMWorkshop on Challenged Networks, CHANTS 2014. After a decade of research into this area, the subject of challenged networks is both generating solutions for practical applications, still re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2012

ISSN: 1545-5971

DOI: 10.1109/tdsc.2012.67