نتایج جستجو برای: specification based detection
تعداد نتایج: 3365367 فیلتر نتایج به سال:
Traditional coverage metrics measure the ability of test cases to fully exercise the source code. The assumption is that fully covered code will better test the correct behavior of the software. Unfortunately, there is no guarantee that the software will meet its specification. In this paper, we present a new coverage metric which measures the ability of the test cases to fully exercise the spe...
The proliferation of mobile computing devices has enabled the utilization of infrastructureless networking as commercial solutions. However, the distributed and cooperative nature of routing in such networks makes them vulnerable to a variety of attacks. This paper proposes a host-based monitoring mechanism, called SIDE that safeguards the operation of the AODV routing protocol. SIDE encompasse...
The unique characteristics of mobile ad hoc networks, such as shared wireless channels, dynamic topologies and a reliance on cooperative behavior, makes routing protocols employed by these networks more vulnerable to attacks than routing protocols employed within traditional wired networks. We propose a specification-based intrusion-detection model for ad hoc routing protocols in which network ...
A mobile ad hoc network consists of wireless nodes that build a robust radio network without any preexisting infrastructure or centralized servers. However, these networks have inherent vulnerabilities that make them susceptible to malicious attacks. In order to secure ad hoc networks advanced techniques must be used, one efficient solution is to use specification-based intrusion detection, esp...
Layered network architectures (OSI, TCP/IP) separate functionality in layers, allowing them to be designed and implemented independently. However, from the security point of view, once a lower layer is compromised, the reliability of the higher layers can be impaired. This paper is about the security of the Data Link Layer, which can affect the reliability of higher layers, like TCP, HTTP and o...
New challenges within the area of security have arisen due to a relatively new paradigm called mobile ad hoc networks. A mobile ad hoc network consists of wireless nodes that build a radio network without any pre-existing infrastructure or centralized servers. However, these networks have inherent vulnerabilities that make them susceptible to malicious attacks such as denial of service, propaga...
One of the most controversial issues in intrusion detection is automating responses to intrusions, which can provide a more efficient, quicker, and precise way to react to an attack in progress than a human. However, it comes with several disadvantages that can lead to a waste of resources, which has so far prevented wide acceptance of automated response-enabled systems. We feel that a structur...
This paper presents a conceptual design model for user interfaces (MASS) and a general formalism for dialogue specification (Interaction Scripts) which are the most important components of an approach to the methodological, iterative design of Interactive Systems from formal, model-based specification of both the application and the User Interface (UI). This approach allows the integration of b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید