نتایج جستجو برای: attacker

تعداد نتایج: 5419  

Journal: :IACR Cryptology ePrint Archive 2007
Serge Fehr Christian Schaffner

Randomness extraction is of fundamental importance for information-theoretic cryptography. It allows to transform a raw key about which an attacker has some limited knowledge into a fully secure random key, on which the attacker has essentially no information. Up to date, only very few randomness-extraction techniques are known to work against an attacker holding quantum information on the raw ...

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

Journal: :ACM SIGCOMM Computer Communication Review 2017

2008
Siddharth Maru Timothy X. Brown

This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threat model, we assume that the attacker is external to the network i.e. the attacker cannot associate with the network and send packets as a participant; nor can the attacker decrypt encrypted data. However , the attacker...

Journal: :Lecture Notes in Computer Science 2021

In cybersecurity, attackers range from brash, unsophisticated script kiddies and cybercriminals to stealthy, patient advanced persistent threats. When modeling these attackers, we can observe that they demonstrate different risk-seeking risk-averse behaviors. This work explores how an attacker’s risk seeking or averse behavior affects their operations against detection-optimizing defenders in I...

2015
Akanksha Jain Abhishek Mathur Mohammad O. Pervaiz Mihaela Cardei Jie Wu Michael P. Howarth Elizabeth M. Royer Chai-Keong Toh Anuj K. Gupta Harsh Sadawarti Anil K. Verma

Sybil attacker is the routing layer active attacker that replies with multiple identification number (ID's) to nodes that forward request to attacker in a different time instant and drop the data forwarded to attacker after link establishment. The proposed research work is provides the novel secure Intrusion Detection System (IDS) against routing misbehavior of Sybil attack in MANET. The IDS ar...

2011
Alex Kirshon Gabi Nakibly

Open Shortest Path First (OSPF) is the most popular interior gateway routing protocol on the Internet. Most of the known OSPF attacks are based on falsifying the link state advertisement (LSA) of an attacker-controlled router. These attacks may create serious damage if the attacker-controlled router is strategically located. However, these attacks can only falsify a small portion of the routing...

Journal: :Lithuanian Mathematical Journal 1968

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید