A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Attack Propagation in Networks
2003
Theory of Computing Systems
ÓÒ ÔÖÓ ×º Ì ÔÖÓØÓ ÓÐ Ð×Ó ×Ô ¹ ¬ × Ò ÓÖÑ Ø ÓÒ Ü Ò ØÛ Ò Ø Ú Ò Û ÒÓ ×º Ð ÖÐÝ¸Ø × Ò ÓÖÑ Ø ÓÒ Ü Ò × ÖÖ ÓÙØ ÐÓÒ Ø ×Ø Ð × Ð Ò ×º ÁØ × ÙØÝ Ó Ø ÔÖÓØÓ ÓÐ ØÓ Ñ ÒØ Ò Ò ÓÖÑ Ø ÓÒ ÓÙØ Ø ÙÖÖ ÒØÐÝ ×Ø Ð × Ð Ò ×º
THE ATTACK ...
doi:10.1007/s00224-003-1087-5
fatcat:pgdsqtxsgrh4tapcdfhagttfbe
Attack propagation in networks
2001
Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures - SPAA '01
ÔÖÓ ×º Ì ÔÖÓØÓ ÓÐ Ð×Ó ×Ô ¹ ¬ × Ò ÓÖÑ Ø ÓÒ Ü Ò ØÛ Ò Ø Ú Ò Û Ò Ó × º Ð ÖÐÝ¸Ø × Ò ÓÖÑ Ø ÓÒ Ü Ò × ÖÖ ÓÙØ ÐÓÒ Ø ×Ø Ð × Ð Ò ×º ÁØ × Ù Ø Ý Ó Ø ÔÖÓØÓ ÓÐ ØÓ Ñ ÒØ Ò Ò ÓÖÑ Ø ÓÒ ÓÙØ Ø ÙÖÖ ÒØÐÝ ×Ø Ð × Ð Ò ×º
THE ATTACK ...
doi:10.1145/378580.378591
dblp:conf/spaa/NikoletseasPSZ01
fatcat:hrne2rlri5ck7ffhrf4fejvowe
Detecting Simulated Attacks in Computer Networks Using Resilient Propagation Artificial Neural Networks
2015
POLIBITS Research Journal on Computer Science and Computer Engineering With Applications
Many studies have been done on applying neural networks in intrusion detection systems. This work presents a study of applying resilient propagation neural networks to detect simulated attacks. ...
In a large network, it is extremely difficult for an administrator or security personnel to detect which computers are being attacked and from where intrusions come. ...
This research describes a solution of applying resilient propagation artificial neural networks to detect simulated attacks in computer networks. ...
doi:10.17562/pb-51-1
fatcat:6c3dmnumsbbirg4or6xi2ym63m
GossipSub: Attack-Resilient Message Propagation in the Filecoin and ETH2.0 Networks
[article]
2020
arXiv
pre-print
Permissionless blockchain environments necessitate the use of a fast and attack-resilient message propagation protocol for Block and Transaction messages to keep nodes synchronised and avoid forks. ...
We test GossipSub in a testbed environment involving more than 5000 VM nodes deployed on AWS and show that it stays immune to all considered attacks. ...
Then, they execute a coordinated network-wide eclipse attack whereby they stop propagating messages in an attempt to completely disrupt the network. ...
arXiv:2007.02754v1
fatcat:kw2or4qucjattebh3dcd5oni2u
Attack propagation of high-powered intrachannel crosstalk in transparent optical networks
2011
Optical Engineering: The Journal of SPIE
In this letter, three attack scenarios, i.e., attack propagation within an optical cross connect (OXC), the secondary attacker traverses successive OXCs and original attacker traverses successive OXCs, ...
Our work proved that the attack signal will propagate intrachannel crosstalk attack to successive three OXCs but with limited two stages of optical switches in each OXC. ...
A model to describe the propagation of intrachannel crosstalk attack in a TON is proposed as shown in Fig. 1 In this figure, a high-powered signal (Attacker) will leak power to the legitimate signal ...
doi:10.1117/1.3641411
fatcat:k3zuiofif5baljabf5jz4tnkji
Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks
2009
2009 Fifth International Conference on Information Assurance and Security
Simulation further shows the impact of insider DoS attacks on network reprogramming in WSNs. ...
In this paper, we identify different types of DoS attacks exploiting the epidemic propagation strategies used by Deluge and propose corresponding analysis models to attempt to quantify the cost of these ...
a code image in the two different conditions respectively. ...
doi:10.1109/ias.2009.215
dblp:conf/IEEEias/ZhangZLP09
fatcat:y7hwqo7mufasniqlc2lgwshara
A study of self-propagating mal-packets in sensor networks: Attacks and defenses
2011
Computers & security
Simulation shows that the propagation pattern of such a mal-packet in a sensor network is very different from worm propagation. ...
Mal-packets can either quickly take over the whole network or hardly propagate under different traffic situations. ...
Conclusion In this paper, we have presented several exploitation techniques by which an attacker can make self-propagating malpackets to infect sensors in a network. ...
doi:10.1016/j.cose.2010.10.002
fatcat:yrwpc3rijvbp3l2x6mclz4dzca
Malware propagation in scale-free networks for the nodes with different anti-attack abilities
2010
Wuli xuebao
Survivable strategy set design for malicious attack propagation in NEMO scenario
2016
EURASIP Journal on Wireless Communications and Networking
To properly address this issue, this paper proposes two novel survivability strategies to handle malicious attack propagation in NEMO scenario. ...
Large-scale failures triggered by undesirable events such as natural disasters, massive power malfunction, and malicious attacks are attracting serious concerns in communication network infrastructure ...
And the total flows of network attack go to 276,531,562 TB. Moreover, the propagation of network attack has increased significantly in mobile network communication. ...
doi:10.1186/s13638-016-0719-9
fatcat:dl773v56sjeghamnb26fjmw45e
Sparse power equalization placement for limiting jamming attack propagation in transparent optical networks
2011
Optical Switching and Networkning Journal
In this paper, we propose the use of wavelength-selective attenuators as power equalizers inside network nodes to limit the propagation of high-power jamming attacks. ...
However, even with network planning approaches which take network security, specifically physical-layer attacks, into account, resilience to deliberate attacks in such scenarios remains an issue. ...
for Innovation Systems), and by BONE (''Building the Future Optical Network in Europe''), a Network of Excellence funded by the European Commission through the 7th ICT-Framework Programme. ...
doi:10.1016/j.osn.2011.06.008
fatcat:bskwfp45ibbstpz4ic5t762724
Limiting physical-layer attack propagation with power equalization placement in transparent WDM networks
2010
Asia Communications and Photonics Conference and Exhibition
We propose and evaluate a Greedy Randomized Adaptive Search Procedure applied to minimize the number of power equalizers (GRASP-PE) needed to limit the propagation of high-power jamming attacks in WDM ...
networks. ...
In [1] it was assumed that attacks, once injected, can propagate unhindered in the network. ...
doi:10.1109/acp.2010.5682518
fatcat:vtutrjbeerdpvgzhxnype4itje
Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks
2013
IEEE Transactions on Mobile Computing
In this paper, we propose a new and powerful network layer attack, routing-towardprimary-user (RPU) attack in CR networks. ...
In this paper, we introduce a new and powerful network layer attack in cognitive radio networks: routing-toward-primary-user (RPU) attack. ...
CONCLUSION In this paper, we proposed a new network layer attack, routing-toward-primary-user attack, in cognitive radio wireless networks. ...
doi:10.1109/tmc.2012.137
fatcat:ddykj5tcibbpnhj3ikabaqehny
Optimizing the Effect of Cropping and Rotation Attacks on Watermarked Images using BacK Propagation Neural Network in DWT Domain
2019
International Journal of Engineering and Advanced Technology
In this proposed work, the watermark is inserted into blue plane of the cover image, In this watermark extraction and embedding process, the back propagation neural network in conjunction with biorthogonal ...
The imperceptibility of the watermark is tested by cropping and rotation attacks effectively ...
In this work, the watermark is embedded into high and middle frequency coefficients using back propagation neural network to provide better robustness and imperceptibility. ...
doi:10.35940/ijeat.f9176.129219
fatcat:kfacen3o2fcsjcwtnpu6oaube4
Wavelength assignment for reducing in-band crosstalk attack propagation in optical networks: ILP formulations and heuristic algorithms
2012
European Journal of Operational Research
This complements our previous work in [Furdek et al., 2010] where we investigated infinite jamming attack propagation to find an upper bound on the network vulnerability to such attacks. ...
In this paper, we propose a wavelength assignment scheme to reduce their damage assuming limited attack propagation capabilities. ...
Acknowledgments The work described in this paper was carried out with the support of the projects "A Security Planning Framework for Optical Networks (SAFE)," funded by the Unity Through Knowledge ...
doi:10.1016/j.ejor.2012.05.022
fatcat:rd24sexkxzho7ga67qj6a7xhmu
Limiting the Propagation of Intra-Channel Crosstalk Attacks in Optical Networks through Wavelength Assignment
2009
Optical Fiber Communication Conference and National Fiber Optic Engineers Conference
unpublished
Physical layer attacks in transparent optical networks are a serious security threat to network operation. ...
We propose a novel protection approach based on wavelength assignment which limits the maximal propagation of intra-channel crosstalk attacks. ...
Conclusion In this paper, we propose a novel approach to dealing with the problem of propagating intra-channel crosstalk attacks in transparent optical networks. ...
doi:10.1364/nfoec.2009.jwa65
fatcat:ph2herbwjnfs3aumfawhehenua
« Previous
Showing results 1 — 15 out of 101,261 results