Filters








40,200 Hits in 3.2 sec

Attack for Flash MIX [chapter]

Masashi Mitomo, Kaoru Kurosawa
2000 Lecture Notes in Computer Science  
The first MIX server can prevent computing the correct output with probability 1 in our attack. We also present a countermeasure for our attack.  ...  This paper shows that the Jakobsson's flash MIX of PODC'99, which was believed to be the most efficient robust MIX net, is broken.  ...  The DK attack [5] for practical MIX [8] does not work for flash MIX directly because two dummy elements are inserted into the input list at the beginning of the protocol in flash MIX.  ... 
doi:10.1007/3-540-44448-3_15 fatcat:gh2gr72kojbarn64rvsntspprq

A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites [chapter]

Ping Chen, Nick Nikiforakis, Christophe Huygens, Lieven Desmet
2015 Lecture Notes in Computer Science  
of mobile users are currently vulnerable to MITM attacks.  ...  In this paper, we investigate the current state of practice about mixed-content websites, websites that are accessed using the HT-TPS protocol, yet include some additional resources using HTTP.  ...  -JavaScript execution: For mixed-JavaScript and mixed-Flash content, the attacker can inject arbitrary JavaScript code that will be executed in the context of the HTTPS website using the mixed content.  ... 
doi:10.1007/978-3-319-27659-5_25 fatcat:mqgtxf26pjbhdgdxbdztct2s3y

Observing the Application-Layer DDoS Attacks for Prevalent Websites

R.Obulakonda Reddy, R.Nagarjuna Reddy, M. Radha, N.Sree Vani, B. Srinivasulu
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Therefore, App-DDoS attacks may be stealthier and more dangerous for the popular Websites than the general Net-DDoS attacks when they mimic (or hide in) the normal flash crowd.  ...  Focusing on the detection for such new DDoS attacks, a scheme based on document popularity is introduced. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd.  ...  RELATED WORK Existing System: Few existing papers focus on the detection of App-DDoS attacks during the flash crowd event.Net-DDoS attacks versus stable background traffic, Net-DDoS attacks versus flash  ... 
doi:10.23956/ijarcsse/v7i6/0344 fatcat:bzkcwmswu5fcdcuvl5kde45eeq

Cluster Based DDoS Detection Method in Data Mining

Ms.R. Keerthika, Dr.C. Nalini, Ms.P. Suganthi, Ms.S. Abinaya
2017 International Journal Of Engineering And Computer Science  
Data mining algorithm is used presents a DDoS attack detection model. Experimental result source that DDoS attacks can be detected efficiently and swiftly.  ...  Distributed denial of service attacks (DDoS) are a growing threat to business worldwide.  ...  It shows the entropy varying with the time, where curve represents the normal flash crowd's entropy and curve represents the entropy of flash crowd mixed with constant rate App-DDoS attacks in zone B.  ... 
doi:10.18535/ijecs/v6i3.19 fatcat:yuugxnptgnff7i44u626o5stsq

Monitoring the Application-Layer DDoS Attacks for Popular Websites

Yi Xie, Shun-Zheng Yu
2009 IEEE/ACM Transactions on Networking  
Focusing on the detection for such new DDoS attacks, a scheme based on document popularity is introduced. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd.  ...  The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website.  ...  Lin (Sun Yat-Sen University, China) for his careful reading and valuable suggestions for the improvement of the paper's presentation.  ... 
doi:10.1109/tnet.2008.925628 fatcat:kmjfwmshdzecdfm4f3zm2gwiiy

Mining Web User Behaviors to Detect Application Layer DDoS Attacks

Chuibi Huang, Jinlin Wang, Gang Wu, Jun Chen
2014 Journal of Software  
Many DDoS attack detection methods are focused on the IP and TCP layers. However, they are not suitable for detecting the application layer DDoS attacks.  ...  Distributed Denial of Service (DDoS) attacks have caused continuous critical threats to the Internet services. DDoS attacks are generally conducted at the network layer.  ...  It is not easy for current techniques to distinguish APP-DDoS attacks from flash crowds.  ... 
doi:10.4304/jsw.9.4.985-990 fatcat:i7t3ojsdwfavdp5kthdxlz56fa

Adaptive Discrimination Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient with Collective Feedback

N. V. Poorrnima, K. Chandra Prabha, B. G. Geetha
2014 IOSR Journal of Computer Engineering  
In our deep study of the size and organization of current botnets, found that the current attack flows are usually more similar to each other compared to the flows of flash crowds In this paper we are  ...  Botnets are commonly the engines behind the attack.  ...  This method detects only port basedflash crowd attacks but they failed to detect for applicationand other flash crowd attacks. III.  ... 
doi:10.9790/0661-16185458 fatcat:rae7y7r7ebfgfinj4zo3rhmeq4

Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content

Phu H. Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V.N. Venkatakrishnan
2015 IEEE Transactions on Dependable and Secure Computing  
Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of dynamic features unique to each platform has popularized it for myriad web development projects.  ...  The severity of these attacks warrants the development of new techniques that address the security of Flash-JavaScript content considered as a whole, in contrast to prior solutions that have examined Flash  ...  Mixed AS-JS content leverages the benefits of both: the interactive features of JS for click-tracking and context customization, and the multimedia features of Flash for improving user experience.  ... 
doi:10.1109/tdsc.2014.2355847 fatcat:pa2o7marrza3hjgdk3bptqiq6e

Detecting DoS Attacks Based on Multi-features in SDN

Meng Yue, Huaiyuan Wang, Liang Liu, Zhijun Wu
2020 IEEE Access  
Although many research efforts have been devoted to identify new features for DoS attack detection, the existing approaches are not able to detect various types of DoS attacks.  ...  For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 8, 2020  ...  Scheme 2: normal background traffic mixed with S-DoS attacks. Scheme 3: normal background traffic mixed with both M-DoS and S-DoS attacks. All normal traffics include Flash crowd scene.  ... 
doi:10.1109/access.2020.2999668 fatcat:56ikwuswmjhsznh3mixow2x36e

Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient

Shui Yu, Wanlei Zhou, Weijia Jia, Song Guo, Yong Xiang, Feilong Tang
2012 IEEE Transactions on Parallel and Distributed Systems  
Sophisticated botmasters attempt to disable detectors by mimicking the traffic patterns of flash crowds. This poses a critical challenge to those who defend against DDoS attacks.  ...  In our deep study of the size and organization of current botnets, we found that the current attack flows are usually more similar to each other compared to the flows of flash crowds.  ...  We also thank Dr Simon James for his proofreading of the manuscript.  ... 
doi:10.1109/tpds.2011.262 fatcat:o7w55mkq6fahfjuaqdl5npdjna

Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

Tongguang Ni, Xiaoqing Gu, Hongyuan Wang, Yu Li
2013 Journal of Control Science and Engineering  
Distributed denial of service (DDoS) attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are  ...  Then, a trained support vector machine (SVM) classifier is applied to identify the attacks.  ...  . , T-60, by mixing attacking traffic 20 HTTP Get requests/ , . . . , 60 HTTP Get requests/s and flash crowd.  ... 
doi:10.1155/2013/821315 fatcat:ctml75qs2zbf7bdqdj3outek7q

Selection of Early Cauliflower Variety for Income Generation

Dhruba Raj Bhattarai, Navin Gopal Pardhan, Basanta Chalise, Sarmila Piya
2015 Nepal Journal of Science and Technology  
Maximum attack of diamond back moth (DMB) was found in White Flash, one of the check variety, whereas the least diamond back moth attack was observed in the genotype HRDCAU005.  ...  An early cauliflower genotype HRDCAU005 was developed from a mix population of Kathmandu Local variety by mess selection at Horticulture Research Division, Lalitpur, Nepal.  ...  Acknowledgements We would like to acknowledge all the farmers for their active participation and cooperation during on farm research.  ... 
doi:10.3126/njst.v15i1.12003 fatcat:t4xrwc5cwjbrndaj5eqd3ddisq

Page 84 of Everybody's Magazine Vol. 58, Issue 5 [page]

1928 Everybody's Magazine  
For the Flash was mixing it up. It would be hard for me to say what the riiift in the Flash’s attack was. Per¬ haps it was no shift at all, merely a change in tempo.  ...  He had been rushed clear off his feet, and as the referee parted them, was forced to back away again, trying to roll with the punches, to solve the whirlwind attack the Flash was launching.  ... 

Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requests [chapter]

Martin Johns, Sebastian Lekies
2011 Lecture Notes in Computer Science  
Client-side Flash proxies provide an interface for JavaScript applications to utilize Flash's cross-domain HTTP capabilities.  ...  However, the subtle differences in the respective implementations of the sameorigin policy and the insufficient security architecture of the JavaScriptto-Flash interface lead to potential security problems  ...  Acknowledgments We would like to thank Kyle Simpson for feedback and valuable insight in the development of flXHR.  ... 
doi:10.1007/978-3-642-22424-9_6 fatcat:b34ufycy5fegxapft6rr4corxy

Flash-Based Security Primitives: Evolution, Challenges and Future Directions

Holden Gordon, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, Fatemeh Tehranipoor
2021 Cryptography  
Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives  ...  Finally, we describe new directions, challenges of research, and possible security vulnerabilities for flash-based security primitives that we believe would benefit from further exploration.  ...  Another attack vector for flash memory is based on the two step-programming sequences of MLC flash.  ... 
doi:10.3390/cryptography5010007 fatcat:27qvp3ovzjhvtpo6aks5sgvquq
« Previous Showing results 1 — 15 out of 40,200 results