A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automated Self-Adaptation for Cyber-Defense -- Pushing Adaptive Perimeter Protection Inward
2013
2013 IEEE 7th International Conference on Self-Adaptation and Self-Organizing Systems Workshops
We describe a number of experiments evaluating the relevance and effectiveness of the integrated cyber-defense operation. ...
This paper presents a recently achieved incremental milestone on the long path toward more intelligently adaptive, automated and self-managed computer systems. ...
We start a malicious client that waits a random interval and sends the attack sequence. When the exploits trigger, the fault injector module injects the intended attack effects. ...
doi:10.1109/sasow.2013.22
dblp:conf/saso/BenyoPSPMMRBF13
fatcat:l57sioptvbgcxg473glmzjlvym
Detection and Analysis of Drive-by Downloads and Malicious Websites
[article]
2020
arXiv
pre-print
Drive by downloads is a very good example of the exponential increase in malicious activity over the Internet and how it affects the daily use of the web. ...
A drive by download is a download that occurs without users action or knowledge. It usually triggers an exploit of vulnerability in a browser to downloads an unknown file. ...
Conclusions In this paper, we proposed an approach to filter benign and malicious websites. ...
arXiv:2002.08007v2
fatcat:432ck2ygnrehfjioknwrr6mkzy
Architecture-based self-protecting software systems
2013
Proceedings of the 9th international ACM Sigsoft conference on Quality of software architectures - QoSA '13
In this paper, we argue for an architecturebased self-protection (ABSP) approach to address this challenge. ...
With this approach, it is possible to reason about the impact of a potential security breach on the system, assess the overall security posture of the system, and achieve defense in depth. ...
A prime example of this pattern comes from the seminal work by [4] described a Byzantine Fault Tolerance (BFT) algorithm that can effectively tolerate f faulty nodes with 3f +1 replicas within a short ...
doi:10.1145/2465478.2465479
dblp:conf/qosa/YuanMSGG13
fatcat:sbhb7vucvfe5plmyygyybkr3lu
UbiCrawler: a scalable fully distributed Web crawler
2004
Software, Practice & Experience
The main features of UbiCrawler are platform independence, linear scalability, graceful degradation in the presence of faults, a very effective assignment function (based on consistent hashing) for partitioning ...
We report our experience in implementing UbiCrawler, a scalable distributed web crawler, using the Java programming language. ...
Note that satisfying partially the above requirement is not difficult: for instance, a typical approach used in non-fault-tolerant distributed crawlers is to compute a modulo-based hash function of the ...
doi:10.1002/spe.587
fatcat:xy4hjii4pjg37b2f2txogzbp6e
Use chains to block DNS attacks: A trusty blockchain-based domain name system
2022
Journal of Communications and Networks
The demand for trusted IP addresses has led a lot of research, including IP whitelisting, DNS filtering and so on. However, these technologies still have many shortcomings. ...
The URL and IP address of a permissioned website are recorded in blockchain through a specific smart contract. ...
He is now a researcher focusing machine learning, information security and cryptography. (e-mail: d9802106@mail.ntust.edu.tw). J.-S. ...
doi:10.23919/jcn.2022.000009
fatcat:ycofwe6phbb4pou7jalpgdutvi
Apoidea: A Decentralized Peer-to-Peer Architecture for Crawling the World Wide Web
[chapter]
2004
Lecture Notes in Computer Science
to the peers for a better and faster crawl. ...
This paper describes a decentralized peer-to-peer model for building a Web crawler. ...
Given the fact that the networking infrastructure of these domains are comparable, a ...
doi:10.1007/978-3-540-24610-7_10
fatcat:gzt5umozxnfltexnxfnokd2pfe
WebEye - Automated Collection of Malicious HTTP Traffic
[article]
2018
arXiv
pre-print
We regard WebEye and the data sets it creates as a tool for researchers and product developers to evaluate and improve their AI-based anti-malware solutions against large-scale benchmarks. ...
Large data sets of realistic web traffic, correctly classified as benign or malicious are needed, not only to train classic and deep learning algorithms, but also to serve as evaluation benchmarks for ...
service for scanning URLs or files for malicious content by using multiple anti virus engines. ...
arXiv:1802.06012v1
fatcat:idaptnjen5em5cmwyjrherczi4
Small trusted primitives for dependable systems
2011
ACM SIGOPS Operating Systems Review
Conservative design for such systems dictates that their security and fault tolerance depend on a very small number of assumptions taken on faith; such assumptions are typically called the "trusted computing ...
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. ...
We would also like to thank our colleague Jaeyeon Jung for providing us with detailed guidance on how to present this article best. ...
doi:10.1145/1945023.1945038
fatcat:wycqymcve5aeflzpkcis4fdaey
Botnet in DDoS Attacks: Trends and Challenges
2015
IEEE Communications Surveys and Tutorials
Botnets pose a major threat to network security as they are widely used for many Internet crimes such as DDoS attacks, identity theft, email spamming, and click fraud. ...
This survey presents a comprehensive overview of DDoS attacks, their causes, types with a taxonomy, and technical details of various attack launching tools. ...
The project has a comprehensive approach that handles both accidental and malicious faults. ...
doi:10.1109/comst.2015.2457491
fatcat:oph4lgawmzbuvgygq4iagsr6eu
"Design and Implementation of Scalable, Fully Distributed Web Crawler for a Web Search Engine"
2011
International Journal of Computer Applications
A new model and architecture for a Web crawler that tightly integrates the crawler with the rest of the search engine is designed first. The development and implementation are discussed in detail. ...
This can be taken one step further, as there are tools available for dealing with all the possible interactions between the modules of a search engine, ...
Fault tolerance A distributed crawler should continue to work under crash faults, that is, when some agents abruptly die. ...
doi:10.5120/1963-2629
fatcat:dmvgucbvwnfu7dsg3pxevzmeuy
Dissecting ghost clicks
2012
Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12
The attackers hijacked clicks and ad impressions on victim machines infected by a DNS changer malware to earn ad revenue fraudulently. ...
We experimented with the attack infrastructure when it was in operation and present a detailed account of the attackers' modus operandi. ...
Overall, the attack infrastructure was well provisioned, with attention paid to fault tolerance. ...
doi:10.1145/2420950.2420954
dblp:conf/acsac/AlrwaisGDSGO12
fatcat:ffps5jvlpvh7niufxc5rrrnv3u
FILTERING OF UNWANTED MESSAGES, IMAGES AND PHISH LINKS ON OSN WALL
2015
International Journal of Research in Engineering and Technology
To overcome the above problems a new proposed system "Filtering of Unwanted Messages, Images and Phish Links on OSN wall" an online application is proposed. ...
The system also provides filtering of images through steganography , that is retrieving the hidden messages from the images. ...
It can tolerate more faults on a network. ...
doi:10.15623/ijret.2015.0404123
fatcat:6nsqodkl7rcefjs7ta2jxudeim
A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection
2012
2012 International Conference on Communication Systems and Network Technologies
These websites have been continuously targeted by highly motivated malicious users to acquire monetary gain. ...
In this paper, we present a detailed review on various types of Structured Query Language Injection attacks, Cross Site Scripting Attack, vulnerabilities, and prevention techniques. ...
Sarma, Scientist 'E' (CERT-In) for inputs. ...
doi:10.1109/csnt.2012.104
fatcat:wssh2iipwncmdgz3juczxqfnom
Permanent Web Publishing
2000
USENIX Annual Technical Conference
It is a majority-voting fault-tolerant system that, unlike normal systems, has far more replicas than would be required just to survive the anticipated failures. ...
We are exploring techniques that exploit the surplus of replicas to permit a much looser form of coordination between them than conventional fault-tolerant technology would require. ...
The project was to a large extent inspired by Danny Hillis & Stewart Brand's Millennium Clock project [clock] . ...
dblp:conf/usenix/RosenthalR00
fatcat:mqecw6tjsbh3vh5ir5oku25gzu
Towards reliable OSGi framework and applications
2006
Proceedings of the 2006 ACM symposium on Applied computing - SAC '06
The OSGi (Open Service Gateway initiative) framework employs the service-oriented approach and the java classloader architecture for the runtime service deployment, that are well suited to the dynamic ...
This paper analyzes software reliability issues in OSGi framework and proposes a proxy-based reliable extensions. ...
In the paper, we propose a proxy-based fault tolerant approach for SOA systems. ...
doi:10.1145/1141277.1141617
dblp:conf/sac/AhnOS06
fatcat:tbe4v7kyvfblza2wudu6umrjwy
« Previous
Showing results 1 — 15 out of 848 results