نتایج جستجو برای: multistep attack scenario

تعداد نتایج: 176512  

Journal: :Information Sciences 2023

Recently, 3D deep learning models have been shown to be susceptible adversarial attacks like their 2D counterparts. Most of the state-of-the-art (SOTA) perform perturbation point clouds. To reproduce these in physical scenario, a generated cloud needs reconstructed mesh, which leads significant drop its effect. In this paper, we propose strong attack named Mesh Attack address problem by directl...

Journal: :J. Internet Serv. Inf. Secur. 2016
Asem Kitana Issa Traoré Isaac Woungang

This paper studies the impact of a mobile botnet on a Long Term Evolution (LTE) network by implementing a mobile botnet architecture that initiates a Distributed Denial of Service (DDoS) attack. To understand the behavior of the mobile botnet, a correlation between the mobile devices’ mobility and the DDoS attack is established. Real traces of taxi cabs are used to simulate the mobile devices’ ...

Journal: :IJCNS 2009
Slim Rekhis Jihène Krichène Noureddine Boudriga

Security incidents targeting information systems have become more complex and sophisticated, and intruders might evade responsibility due to the lack of evidence to convict them. In this paper, we develop a system for Digital Forensic in Networking, called DigForNet, which is useful to analyze security incidents and explain the steps taken by the attackers. DigForNet combines intrusion response...

2004
Nick Mathewson Roger Dingledine

We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis attacks against anonymous message systems, by describing how an eavesdropper can learn sender-receiver connections even when the substrate is a network of pool mixes, the attacker is non-global, and senders have complex behavior or generate padding messages. Additionally, we describe how an attack...

2003
Tao Peng Christopher Leckie Kotagiri Ramamohanarao

We propose a distributed approach to detect distributed denial of service attacks by monitoring the increase of new IP addresses. Unlike previous proposals for bandwidth attack detection schemes which are based on monitoring the traffic volume, our scheme is very effective for highly distributed denial of service attacks. Our scheme exploits an inherent feature of DDoS attacks, which makes it h...

2009
Hong Chen Ninghui Li Ziqing Mao

Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppArmor, have been introduced. In this paper we propose an approach to analyze and compare the quality of protection offered by these different MAC systems. We introduce the notion of vulnerability surfaces under attack s...

Journal: :J. Mathematical Cryptology 2012
Gérard Maze

This article presents an analysis of the secure key broadcasting scheme proposed by Wu, Ruan, Lai and Tseng [11]. The study of the parameters of the system is based on a connection with a special type of symmetric equations over finite fields. We present two different attacks against the system, whose efficiency depends on the choice of the parameters. In particular, a time-memory tradeoff atta...

2013
Erich Wenger Thomas Korak Mario Kirschbaum

Using RFID tags for security critical applications requires the integration of cryptographic primitives, e.g., Elliptic Curve Cryptography (ECC). It is specially important to consider that RFID tags are easily accessible to perform practical side-channel attacks due to their fields of applications. In this paper, we investigate a practical attack scenario on a randomized ECC hardware implementa...

Journal: :Psychophysiology 2011
John B Meixner J Peter Rosenfeld

Previous studies examining the P300-based concealed information test typically tested for mock crime or autobiographical details, but no studies have used this test in a counterterrorism scenario. Subjects in the present study covertly planned a mock terrorist attack on a major city. They were then given three separate blocks of concealed information testing, examining for knowledge of the loca...

2013
Changwei Liu Anoop Singhal Duminda Wijesekera

Evidence graphs model network intrusion evidence and their dependen­ cies to help with network forensics analysis. With quantitative metrics, probabilistic evidence graphs provide a way to link probabilities associ­ ated with different attack paths with available evidence. Existing work in evidence graphs assumes that all available evidence forms a single evidence graph. We show how to merge di...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید