نتایج جستجو برای: multistep attack scenario

تعداد نتایج: 176512  

Journal: :sahand communications in mathematical analysis 0
parviz darania department of mathematics, faculty of science, urmia university, p.o.box 5756151818, urmia-iran.

‎the main purpose of this paper is to study the numerical solution of nonlinear volterra integral equations with constant delays, based on the multistep collocation method. these methods for approximating the solution in each subinterval are obtained by fixed number of previous steps and fixed number of collocation points in current and next subintervals. also, we analyze the convergence of the...

2012
Nischay Bahl Ajay K. Sharma Harsh K. Verma Konstantinos Pelechrinis Marios Iliofotou Srikanth V. Krishnamurthy Robert Szewczyk Joseph Polastre Alan Mainwaring Adrian Perrig John Stankovic David Wagner JP Walters Yang Xiao Anthony D. Wood John A. Stankovic Sherif Khattab Daniel Mosse Wenyuan Xu Timothy Wood Wade Trappe Hung-Min Sun Shih-Pu Hsu

On denial-of-service (DoS) attacks for wireless sensor networks (WSNs), we investigated the security aspects of the physical layer. We conducted the simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802. 15. 4 based OPNET simulative model for WSN under constant and varying inten...

2014
Mohammed Alhomidi Martin Reed

Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions for each attack in a single unifying model. This paper proposes a methodology to explore the graph using a genetic algorithm (GA). Each attack path is considered as an independent attack scenario from the sourc...

Journal: :I. J. Network Security 2012
B. B. Gupta Ramesh Chandra Joshi Manoj Misra

A real time estimation of the number of zombies in DDoS attack scenario is helpful to suppress the effect of attack by choosing predicted number of most suspicious attack sources for either filtering or rate limiting. In this paper, ANN is employed to estimate number of zombies involved in a DDoS attack. The method does not depend on the frequency of attack and hence solves the problem of low d...

2012
Slobodan Petrović

Linear Consistency Test (LCT) is a well-known algebraic method of cryptanalysis of stream ciphers. In this paper, we use LCT in an attack on a noised irregularly clocked linear feedback shift register (LFSR). We show that it is possible to reconstruct the initial states of both the clocked and the clocking LFSR in this scheme by using an essentially algebraic attack method, such as LCT, as a bu...

2014
Heather Rosoff Jinshu Cui Richard S. John

We conducted two scenario-simulation behavioral experiments to explore individual users’ response to common cyber-based financial fraud and identity theft attacks depend on systematically manipulated variables related to characteristics of the attack and the attacker. Experiment I employed a 4 by 2 between-groups factorial design, manipulating attacker characteristics (individual with picture v...

2012
Ninghui Li Elisa Bertino Dongyan Xu Xiangyu Zhang Aditya Mathur Hong Chen

Chen, Hong Ph.D., Purdue University, December 2009. Analysis of Access Control Poli­ cies in Operating Systems . Major Professor: Ninghui Li. Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system...

2012
Jie Wang

Computer network systems are constantly under attack or have to deal with attack attempts. The first step in any network’s ability to fight against intrusive attacks is to be able to detect intrusions when they are occurring. Intrusion Detection Systems (IDS) are therefore vital in any kind of network, just as antivirus is a vital part of a computer system. With the increasing computer network ...

Journal: :Logic Journal of the IGPL 2013
Zorana Bankovic Juan Carlos Vallejo David Fraga José Manuel Moya

It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario, the attackers collude to give negative feedback on the victim in order to low...

2012
Ajay Sharma Rajesh Babu Ahirwar Smita Patil

A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the wired networks from traditional scenario to new paradigm. The mobile ad hoc networks are purely infrastructure less network. Due to this vulnerabilities of the network are unprotected ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید