Filters








101,261 Hits in 3.6 sec

Attack Propagation in Networks

Sotiris Nikoletseas, Grigorios Prasinos, Paul Spirakis, Christos Zaroliagis
2003 Theory of Computing Systems  
ÓÒ ÔÖÓ ×º Ì ÔÖÓØÓ ÓÐ Ð×Ó ×Ô ¹ ¬ × Ò ÓÖÑ Ø ÓÒ Ü Ò ØÛ Ò Ø Ú Ò Û ÒÓ ×º Ð ÖÐÝ¸Ø × Ò ÓÖÑ Ø ÓÒ Ü Ò × ÖÖ ÓÙØ ÐÓÒ Ø ×Ø Ð × Ð Ò ×º ÁØ × ÙØÝ Ó Ø ÔÖÓØÓ ÓÐ ØÓ Ñ ÒØ Ò Ò ÓÖÑ Ø ÓÒ ÓÙØ Ø ÙÖÖ ÒØÐÝ ×Ø Ð × Ð Ò ×º THE ATTACK  ... 
doi:10.1007/s00224-003-1087-5 fatcat:pgdsqtxsgrh4tapcdfhagttfbe

Attack propagation in networks

Sotiris Nikoletseas, Grigorios Prasinos, Paul Spirakis, Christos Zaroliagis
2001 Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures - SPAA '01  
ÔÖÓ ×º Ì ÔÖÓØÓ ÓÐ Ð×Ó ×Ô ¹ ¬ × Ò ÓÖÑ Ø ÓÒ Ü Ò ØÛ Ò Ø Ú Ò Û Ò Ó × º Ð ÖÐÝ¸Ø × Ò ÓÖÑ Ø ÓÒ Ü Ò × ÖÖ ÓÙØ ÐÓÒ Ø ×Ø Ð × Ð Ò ×º ÁØ × Ù Ø Ý Ó Ø ÔÖÓØÓ ÓÐ ØÓ Ñ ÒØ Ò Ò ÓÖÑ Ø ÓÒ ÓÙØ Ø ÙÖÖ ÒØÐÝ ×Ø Ð × Ð Ò ×º THE ATTACK  ... 
doi:10.1145/378580.378591 dblp:conf/spaa/NikoletseasPSZ01 fatcat:hrne2rlri5ck7ffhrf4fejvowe

Detecting Simulated Attacks in Computer Networks Using Resilient Propagation Artificial Neural Networks

Mario A. Garcia, Tung Trinh
2015 POLIBITS Research Journal on Computer Science and Computer Engineering With Applications  
Many studies have been done on applying neural networks in intrusion detection systems. This work presents a study of applying resilient propagation neural networks to detect simulated attacks.  ...  In a large network, it is extremely difficult for an administrator or security personnel to detect which computers are being attacked and from where intrusions come.  ...  This research describes a solution of applying resilient propagation artificial neural networks to detect simulated attacks in computer networks.  ... 
doi:10.17562/pb-51-1 fatcat:6c3dmnumsbbirg4or6xi2ym63m

GossipSub: Attack-Resilient Message Propagation in the Filecoin and ETH2.0 Networks [article]

Dimitris Vyzovitis, Yusef Napora, Dirk McCormick, David Dias, Yiannis Psaras
2020 arXiv   pre-print
Permissionless blockchain environments necessitate the use of a fast and attack-resilient message propagation protocol for Block and Transaction messages to keep nodes synchronised and avoid forks.  ...  We test GossipSub in a testbed environment involving more than 5000 VM nodes deployed on AWS and show that it stays immune to all considered attacks.  ...  Then, they execute a coordinated network-wide eclipse attack whereby they stop propagating messages in an attempt to completely disrupt the network.  ... 
arXiv:2007.02754v1 fatcat:kw2or4qucjattebh3dcd5oni2u

Attack propagation of high-powered intrachannel crosstalk in transparent optical networks

Zeyu Sun
2011 Optical Engineering: The Journal of SPIE  
In this letter, three attack scenarios, i.e., attack propagation within an optical cross connect (OXC), the secondary attacker traverses successive OXCs and original attacker traverses successive OXCs,  ...  Our work proved that the attack signal will propagate intrachannel crosstalk attack to successive three OXCs but with limited two stages of optical switches in each OXC.  ...  A model to describe the propagation of intrachannel crosstalk attack in a TON is proposed as shown in Fig. 1 In this figure, a high-powered signal (Attacker) will leak power to the legitimate signal  ... 
doi:10.1117/1.3641411 fatcat:k3zuiofif5baljabf5jz4tnkji

Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks

Yu Zhang, Xing She Zhou, Yee Wei Law, Marimuthu Palaniswami
2009 2009 Fifth International Conference on Information Assurance and Security  
Simulation further shows the impact of insider DoS attacks on network reprogramming in WSNs.  ...  In this paper, we identify different types of DoS attacks exploiting the epidemic propagation strategies used by Deluge and propose corresponding analysis models to attempt to quantify the cost of these  ...  a code image in the two different conditions respectively.  ... 
doi:10.1109/ias.2009.215 dblp:conf/IEEEias/ZhangZLP09 fatcat:y7hwqo7mufasniqlc2lgwshara

A study of self-propagating mal-packets in sensor networks: Attacks and defenses

Qijun Gu, Christopher Ferguson, Rizwan Noorani
2011 Computers & security  
Simulation shows that the propagation pattern of such a mal-packet in a sensor network is very different from worm propagation.  ...  Mal-packets can either quickly take over the whole network or hardly propagate under different traffic situations.  ...  Conclusion In this paper, we have presented several exploitation techniques by which an attacker can make self-propagating malpackets to infect sensors in a network.  ... 
doi:10.1016/j.cose.2010.10.002 fatcat:yrwpc3rijvbp3l2x6mclz4dzca

Malware propagation in scale-free networks for the nodes with different anti-attack abilities

Song Yu-Rong, Jiang Guo-Ping
2010 Wuli xuebao  
doi:10.7498/aps.59.705 fatcat:7tdd6a43b5d4nmkecbjeyjwke4

Survivable strategy set design for malicious attack propagation in NEMO scenario

Su Yao, Jianfeng Guan, Hongke Zhang
2016 EURASIP Journal on Wireless Communications and Networking  
To properly address this issue, this paper proposes two novel survivability strategies to handle malicious attack propagation in NEMO scenario.  ...  Large-scale failures triggered by undesirable events such as natural disasters, massive power malfunction, and malicious attacks are attracting serious concerns in communication network infrastructure  ...  And the total flows of network attack go to 276,531,562 TB. Moreover, the propagation of network attack has increased significantly in mobile network communication.  ... 
doi:10.1186/s13638-016-0719-9 fatcat:dl773v56sjeghamnb26fjmw45e

Sparse power equalization placement for limiting jamming attack propagation in transparent optical networks

Amornrat Jirattigalachote, Nina Skorin-Kapov, Marija Furdek, Jiajia Chen, Paolo Monti, Lena Wosinska
2011 Optical Switching and Networkning Journal  
In this paper, we propose the use of wavelength-selective attenuators as power equalizers inside network nodes to limit the propagation of high-power jamming attacks.  ...  However, even with network planning approaches which take network security, specifically physical-layer attacks, into account, resilience to deliberate attacks in such scenarios remains an issue.  ...  for Innovation Systems), and by BONE (''Building the Future Optical Network in Europe''), a Network of Excellence funded by the European Commission through the 7th ICT-Framework Programme.  ... 
doi:10.1016/j.osn.2011.06.008 fatcat:bskwfp45ibbstpz4ic5t762724

Limiting physical-layer attack propagation with power equalization placement in transparent WDM networks

Amornrat Jirattigalachote, Nina Skorin-Kapov, Marija Furdek, Jiajia Chen, Paolo Monti, Lena Wosinska
2010 Asia Communications and Photonics Conference and Exhibition  
We propose and evaluate a Greedy Randomized Adaptive Search Procedure applied to minimize the number of power equalizers (GRASP-PE) needed to limit the propagation of high-power jamming attacks in WDM  ...  networks.  ...  In [1] it was assumed that attacks, once injected, can propagate unhindered in the network.  ... 
doi:10.1109/acp.2010.5682518 fatcat:vtutrjbeerdpvgzhxnype4itje

Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks

Zhou Yuan, Zhu Han, Yan Lindsay Sun, Husheng Li, Ju Bin Song
2013 IEEE Transactions on Mobile Computing  
In this paper, we propose a new and powerful network layer attack, routing-towardprimary-user (RPU) attack in CR networks.  ...  In this paper, we introduce a new and powerful network layer attack in cognitive radio networks: routing-toward-primary-user (RPU) attack.  ...  CONCLUSION In this paper, we proposed a new network layer attack, routing-toward-primary-user attack, in cognitive radio wireless networks.  ... 
doi:10.1109/tmc.2012.137 fatcat:ddykj5tcibbpnhj3ikabaqehny

Optimizing the Effect of Cropping and Rotation Attacks on Watermarked Images using BacK Propagation Neural Network in DWT Domain

2019 International Journal of Engineering and Advanced Technology  
In this proposed work, the watermark is inserted into blue plane of the cover image, In this watermark extraction and embedding process, the back propagation neural network in conjunction with biorthogonal  ...  The imperceptibility of the watermark is tested by cropping and rotation attacks effectively  ...  In this work, the watermark is embedded into high and middle frequency coefficients using back propagation neural network to provide better robustness and imperceptibility.  ... 
doi:10.35940/ijeat.f9176.129219 fatcat:kfacen3o2fcsjcwtnpu6oaube4

Wavelength assignment for reducing in-band crosstalk attack propagation in optical networks: ILP formulations and heuristic algorithms

Nina Skorin-Kapov, Marija Furdek, Ramon Aparicio Pardo, Pablo Pavón Mariño
2012 European Journal of Operational Research  
This complements our previous work in [Furdek et al., 2010] where we investigated infinite jamming attack propagation to find an upper bound on the network vulnerability to such attacks.  ...  In this paper, we propose a wavelength assignment scheme to reduce their damage assuming limited attack propagation capabilities.  ...  Acknowledgments The work described in this paper was carried out with the support of the projects "A Security Planning Framework for Optical Networks (SAFE)," funded by the Unity Through Knowledge  ... 
doi:10.1016/j.ejor.2012.05.022 fatcat:rd24sexkxzho7ga67qj6a7xhmu

Limiting the Propagation of Intra-Channel Crosstalk Attacks in Optical Networks through Wavelength Assignment

Nina Skorin-Kapov, Marija Furdek
2009 Optical Fiber Communication Conference and National Fiber Optic Engineers Conference   unpublished
Physical layer attacks in transparent optical networks are a serious security threat to network operation.  ...  We propose a novel protection approach based on wavelength assignment which limits the maximal propagation of intra-channel crosstalk attacks.  ...  Conclusion In this paper, we propose a novel approach to dealing with the problem of propagating intra-channel crosstalk attacks in transparent optical networks.  ... 
doi:10.1364/nfoec.2009.jwa65 fatcat:ph2herbwjnfs3aumfawhehenua
« Previous Showing results 1 — 15 out of 101,261 results