29,775 Hits in 6.0 sec

Analysis of Flooding DoS Attacks Utilizing DNS Name Error Queries

Zheng Wang
2012 KSII Transactions on Internet and Information Systems  
And the attacking queries can be mitigated by the resolvers with a sample proportion adaptive to the percent of queries for the existent domain names.  ...  While the flooding DoS attacks may be alleviated by the DNS caching mechanism, we show in this paper that flooding DoS attacks utilizing name error queries is capable of bypassing the cache of resolvers  ...  Time Intervals for DNS Requests Using One Name Error Queries one name error query Time interval Minimum time interval = 10.09 example, BIND, DBJDNS, etc.).  ... 
doi:10.3837/tiis.2012.10.018 fatcat:zugahjyghreuzddf5t6g7gz4oe

A local fingerprinting approach for audio copy detection [article]

Mani Malekesmaeili, Rabab K. Ward
2013 arXiv   pre-print
Then, we propose a novel fingerprinting algorithm that extracts local fingerprints from the time-chroma image.  ...  The proposed local fingerprinting algorithm is invariant to time/frequency scale changes in audio signals. It also outperforms existing methods like SIFT by a great extent.  ...  duration of the time interval (in the query) corresponding to song s i .  ... 
arXiv:1304.0793v1 fatcat:5iikjsvwkndhbajswptnzupl2y


Shirin Nilizadeh, Naveed Alam, Nathaniel Husted, Apu Kapadia
2011 Proceedings of the 10th annual ACM workshop on Privacy in the electronic society - WPES '11  
Furthermore we explore statistical attacks specific to this domain, and show how queriers and experts can maintain their anonymity over time to defend against such attacks.  ...  Through simulation on social network graphs, we show it is possible to strike a balance between privacy, timely satisfaction of queries, and proximity of experts to queriers, while maintaining scalability  ...  While users may need to wait an extra time interval to get remote answers, we note that usually we expect queries to be satisfied locally and if not, users would wait for a remote answer.  ... 
doi:10.1145/2046556.2046562 dblp:conf/wpes/NilizadehAHK11 fatcat:ppdjlggwljfdfbs2f5cot3zaga

The Security of NTP's Datagram Protocol [chapter]

Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg
2017 Lecture Notes in Computer Science  
NTP's control-query interface also leaks the nonce used in the special version of TEST2 used in interleaved mode.  ...  We exploit these problems in several attacks that remote attackers can use to maliciously alter a target's time. We use network scans to find millions of IPs that are vulnerable to our attacks.  ...  We thank the Network Time Foundation and the maintainers of chrony and NTPsec for patching vulnerabilities described here.  ... 
doi:10.1007/978-3-319-70972-7_23 fatcat:yi2mzvq5rng2dkdllhz3gxswbi

Research on Selection Method of Privacy Parameter ε

Pan Jun Sun, Vincenzo Conti
2020 Security and Communication Networks  
Δ q , the length of the fault tolerance interval L , and the success probability p as long as the fault tolerance interval.  ...  Thirdly, this paper proposes the differential privacy parameter selection methods based on the single attack and repeated attacks and calculates the upper bound of the parameter ε based on the sensitivity  ...  Considering two intervals (− ∞, y + 0.5] and (y + 0.5, +∞], a times falls into [y + 0.5, +∞) and b times falls into (− ∞, y + 0.5] afterN times of attacks.  ... 
doi:10.1155/2020/8845038 fatcat:63wdwomd2vch3cnoqljfpdrspi

A Secure Query Protocol for Multi-layer Wireless Sensor Networks Based on Internet of Things

Tao Lin, Peng Wu, Fengmei Gao, Linhong Wang
2019 Revue d'intelligence artificielle : Revue des Sciences et Technologies de l'Information  
The simulation results show that our protocol outperforms the traditional protocols in query time, coding length and bucket mechanism, and enjoys high power efficiency, low storage cost and good query  ...  This paper puts forward a secure query protocol for wide-range multi-layer WSNs based on the Internet of Things (IoT), which protects data transmission from three aspects: network security, attack mode  ...  The system initialization formula can be established as: ( ) : , , i i Q S K k m → (4) The local query mainly computes the m value in Ii,t=(vi,t-m), using the R-D algorithm, and determines the code set  ... 
doi:10.18280/ria.330210 fatcat:sdnhjr67s5fqlikuxzkqgxyc2e

Reconstructing system state for intrusion analysis

Ashvin Goel, Kamran Farhadi, Kenneth Po, Wu-chang Feng
2008 ACM SIGOPS Operating Systems Review  
In this paper, we describe a technique that helps generate a time-line of the state of the system.  ...  This technique, based on preprocessing the audit log, simplifies the implementation of the analysis queries and enables running the analysis tools interactively on large data sets.  ...  These queries use the interval tables shown in Figure 1 , and the table shows that these queries can be used interactively.  ... 
doi:10.1145/1368506.1368511 fatcat:oi3cnc5rhzazbbgba52ynkndte

Leveraging Smartphone Advances for Continuous Location Privacy

Wisam Eltarjaman, Prasad Annadata, Rinku Dewri, Ramakrishna Thurimella
2015 2015 16th IEEE International Conference on Mobile Data Management  
With this motivation, we propose a novel privacy algorithm for use in POI search that achieves much of the desired location privacy by restricting the usage of precise location data to the client device  ...  We first show how the privacy algorithm executed in the mobile device for single query systems is susceptible to localization attacks (determining where the user is at a specific point in time) when used  ...  Each simulation is executed with t = 1T, 5T, and 10T as the time interval between queries.  ... 
doi:10.1109/mdm.2015.36 dblp:conf/mdm/EltarjamanADT15 fatcat:cgpbdyt5lnabzcc3x3zbxhxjcq

ShieldDB: An Encrypted Document Database with Padding Countermeasures [article]

Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, Cong Wang
2021 arXiv   pre-print
Unlike prior works, we target a more realistic adversarial model, where the database gets updated continuously, and the adversary can monitor it at an (or multiple) arbitrary time interval(s).  ...  ShieldDB's padding strategies ensure that the access pattern to the database is obfuscated all the time.  ...  For both attack models, S cannot obtain the query tokens against the encrypted data collections streamed in the current time interval.  ... 
arXiv:2003.06103v2 fatcat:p2otnrubejgjxpprcxjqmy3wk4

BOSH: An Efficient Meta Algorithm for Decision-based Attacks [article]

Zhenxin Xiao, Puyudi Yang, Yuchen Jiang, Kai-Wei Chang, Cho-Jui Hsieh
2019 arXiv   pre-print
This type of attacks can be used to attack discrete and complex models, such as Gradient Boosting Decision Tree (GBDT) and detection-based defense models.  ...  queries.  ...  Dataset Maximum Queries Per Direction Cutting and Resampling Interval Interval Increase Ratio resample Times MNIST 40000 3500 1.4 3 CIFAR-10 20000 2000 1.3 3 ImageNet 200000 6000  ... 
arXiv:1909.04288v3 fatcat:ebhx7hqubzgffhpr7ddd5elr6q

QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things

Khan, Noor, Mat Kiah, Noor, Altowaijri, Rahman
2019 Symmetry  
using query control mechanisms.  ...  Redundant, unwanted, and flooded queries are major causes of inefficient utilization of resources. IoT devices consume more energy and high computational time.  ...  During flooding attacks this technique is accountable for checking mote locality and query detection strength in an IoT network.  ... 
doi:10.3390/sym11050634 fatcat:szeg2a7thna73idivtxl2papua

Online anonymity for personalized web services

Yabo Xu, Ke Wang, Guoliang Yang, Ada W.C. Fu
2009 Proceeding of the 18th ACM conference on Information and knowledge management - CIKM '09  
The challenge for providing online anonymity is dealing with unknown and dynamic web users who can get online and offline at any time.  ...  However, detailed personal information could identify the sender of sensitive queries, thus compromise user privacy.  ...  Often, T q is an interval containing the actual query time because the attacker knows an approximate query time, but not the exact query time.  ... 
doi:10.1145/1645953.1646155 dblp:conf/cikm/XuWYF09 fatcat:s52vog3cbbgmhd67nkesh7uws4

A review of video fingerprints invariant to geometric attacks

Regunathan Radhakrishnan, Wenyu Jiang, Claus Bauer, Edward J. Delp III, Jana Dittmann, Nasir D. Memon, Ping Wah Wong
2009 Media Forensics and Security  
Video fingerprints can help us identify a large amount of video on the Internet and enable interesting services to the end user.  ...  It also requires a longer query clip than Approach 2 for reliable identification. We present results comparing the performance of both of these approaches for a 150hr video database.  ...  Step 2: For each time interval T int (see Figure 1 ), we select a group of frames around the time interval with a combined length of T chunk > T int .  ... 
doi:10.1117/12.805627 dblp:conf/mediaforensics/RadhakrishnanJB09 fatcat:stghn4k5obazxirp7i4hihqfv4

Jamming Detection Mechanisms for Wireless Sensor Networks

Murat Çakiroglu, Ahmet Turan Özcerit
2008 Proceedings of the Third International ICST Conference on Scalable Information Systems  
In this paper, we have developed two detection mechanisms used for J-DoS attacks in order to differentiate the legitimate and adversary scenarios.  ...  The nodes of WSNs are prone to external disturbances especially when they are used in hostile environments.  ...  Periodic listening interval jammer attacks when the nodes are in listening period and sleeps at all times. Figure- 1 S 1 Figure-1 S-MAC timing diagram. Figure- 2 . 2 Figure-2.  ... 
doi:10.4108/icst.infoscale2008.3484 dblp:conf/infoscale/CakirogluO08 fatcat:7jnok4gc65dnfdcgbnfm5eauym

MeshCloak: A Map-Based Approach for Personalized Location Privacy [article]

Hiep H. Nguyen
2017 arXiv   pre-print
MeshCloak also takes into account real speed profiles and query frequencies.  ...  A problem in the existing cloaking schemes is that location vulnerabilities may be exposed when an attacker exploits a street map in their attacks.  ...  Similarly, query interval and query interval proportion let us know the proportions of users issuing queries after a given time interval.  ... 
arXiv:1709.03642v1 fatcat:i56fci5co5d2xpdm7g3g74bqqi
« Previous Showing results 1 — 15 out of 29,775 results