نتایج جستجو برای: malicious but passive key generation center attack

تعداد نتایج: 3071153  

2008
Hyewon Park Tomoyuki Asano Kwangjo Kim

Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir [1] proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. [12] proposed two-round ID-based AGKA protocol which is very efficient in communication a...

2014
Rajesh Kumar Tajinder Kaur P. Haffner S. Sen D. Wang J. Ma K. Levchenko C. Kreibich S. Savage G. M. Voelker

In this paper, Data mining technique is used to present the concept of attack data analysis and traffic classification. Here the system is completely a automated system that contains packet capturing, processing of multiple attack logs, labeling of network traffic based on low level features and applying the classification algorithm to build a traffic classifier which will classify the normal a...

Journal: :IJISP 2013
Ammar Alazab Michael Hobbs Jemal H. Abawajy Ansam Khraisat

The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule gen...

2014
Ching-Hao Mao Chung-Jung Wu Evangelos E. Papalexakis Christos Faloutsos Kuo-Chen Lee Tien-Cheu Kao

What are the patterns that typical network attackers exhibit? For a given malicious network behaviors, are its attacks spread uniformly over time? In this work, we develop MalSpot, multi-resolution and multi-linear (Multi) network analysis system in order to discover such malicious patterns, so that we can use them later for attack detection, when attacks are concurrent with legitimate traffic....

Journal: :Quantum Information & Computation 2014
Tzu-Han Lin Chun-Wei Yang Tzonelih Hwang

This study points out that a malicious communicant in Hwang et al.’s probabilistic quantum key distribution (PQKD) protocol can manipulate the secret key without being detected by using the unitary operation attack. Accordingly, the security requirements of a PQKD protocol, i.e., unpredictability and fairness, cannot be satisfied in their protocol. A possible solution is also provided to solve ...

2016
Weilin Xu Yanjun Qi David Evans

Machine learning is widely used to develop classifiers for security tasks. However, the robustness of these methods against motivated adversaries is uncertain. In this work, we propose a generic method to evaluate the robustness of classifiers under attack. The key idea is to stochastically manipulate a malicious sample to find a variant that preserves the malicious behavior but is classified a...

Journal: :Int. Journal of Network Management 2005
Yuh-Min Tseng

Malicious intruders may launch as many invalid requests as possible without establishing a server connection to bring server service to a standstill. This is called a denial-of-service (DoS) or distributed DoS (DDoS) attack. Until now, there has been no complete solution to resisting a DoS/DDoS attack. Therefore, it is an important network security issue to reduce the impact of a DoS/DDoS attac...

Journal: :Algorithms 2023

Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks. The paper presents a vehicle-security operatio...

2016
Pratima Popat Gutal

Distributed key generation cryptosystems has a major content called distributed key generation (DKG) protocol. This protocol allows number of participants of group to generate a set of keys such as private key and public key without determining some trusted participants. Only authorized subgroups of participants are capable to regenerate or implement the private key and the public key is an out...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید