A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Real-Time Intruder Tracing through Self-Replication
[chapter]
2002
Lecture Notes in Computer Science
Therefore, it needs to trace the intruder in real time. Existing real-time intruder tracing systems has a spatial restriction. ...
This paper proposes selfreplication mechanism, a new approach to real-time intruder tracing, minimizing a spatial limitation of traceable domain. ...
Section 3 proposes the Self-Replication mechanism for real-time intruder tracing. Section 4 shows that the security domain for real-time tracing is extended through the Self-Replication. ...
doi:10.1007/3-540-45811-5_1
fatcat:6aacttpffzbajnm5du2c2gvvwy
SECURITY MECHANISM FOR MANETS
2009
Journal of Engineering Science and Technology
Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility. ...
Coloured Petri Net model has been used to describe how different agents coordinate to protect the mobile ad hoc network from intruding and attack. ...
Real-time approach is host-based and adopts the anomaly detection paradigm. ...
doaj:9cfa90dcca2040aaa7f85864176cb2fd
fatcat:ptlckaar6vbhfpo7g6vyygrdtq
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
2016
IEEE Access
Nevertheless, the significance of networks in cloud computing has drawn intruders to attack cloud networks through malicious attacks [8]-[10] such as illegal access, insertion of malicious code, modification ...
In general, cloud computing is a connected resource through various distributed networks [3] . ...
on a real-time basis. ...
doi:10.1109/access.2016.2631543
fatcat:vqsuwx4hdvcy7ogfsw3woernzq
Secrobat: Secure and Robust Component-based Architectures
2006
2006 13th Asia Pacific Software Engineering Conference (APSEC'06)
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to "patch" them up. ...
, there is a strong need for a systematic engineering approach to developing secure and robust systems, especially distributed systems, by considering functional and security requirements at the same time ...
At the same time, if the difference between the significance number of the attacked peer and the real number of its replicated peer is more than 0, the system tries to create new copies of the attacked ...
doi:10.1109/apsec.2006.50
dblp:conf/apsec/VorobievH06
fatcat:b462o3f37ndydpw2a26usy4po4
A tamper-resistant framework for unambiguous detection of attacks in user space using process monitors
2003
First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings.
An intruder could compromise any number of the available copies of a service resulting in a false sense of security. ...
Replication and redundancy techniques rely on the assumption that a majority of components are always safe and voting is used to resolve any ambiguities. ...
Implementation Issues The circulant digraph framework requires the implementation of a closed loop, where events or messages are delivered in real time. ...
doi:10.1109/iwias.2003.1192456
dblp:conf/iwia/ChinchaniUK03
fatcat:bxfngndwkncotptwjwn3orooh4
Detection of Security Attacks in Industrial IoT Networks: A Blockchain and Machine Learning Approach
2021
Electronics
The proposed solution achieved the proposed objectives and is presented as a viable mechanism for detecting and containing intruders in an IoT network. ...
Taking into account its versatility, it is possible to carry out real implementations that can identify intruders in real time and contain them with little computational effort in networks as small and ...
On the other hand, and for the test scenarios, data from the attacks defined in real time were used. ...
doi:10.3390/electronics10212662
fatcat:whs3qrfi2bhp5j7rdkjbv6tvx4
Ownership and Trade from Evolutionary Games
[article]
2002
arXiv
pre-print
Half the time, the V -valuer is the owner, half the time the intruder. ...
As a result of peer mimicry, the population establishes and self-enforces over time standards of normal behavior. ...
arXiv:physics/0210125v1
fatcat:vbee7p22ojb7daasm26ii4poeu
Ownership and Trade from Evolutionary Games
2002
Social Science Research Network
Half the time, the V -valuer is the owner, half the time the intruder. ...
As a result of peer mimicry, the population establishes and self-enforces over time standards of normal behavior. ...
doi:10.2139/ssrn.319102
fatcat:lwidxzq3njfmlewfg7usqx5fmu
Ownership and trade from evolutionary games
2003
International Review of Law and Economics
Half the time, the V -valuer is the owner, half the time the intruder. ...
As a result of peer mimicry, the population establishes and self-enforces over time standards of normal behavior. ...
doi:10.1016/s0144-8188(03)00026-7
fatcat:vhf67lza75em3pc2p5ckexjpia
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks
2013
International journal of network security and its applications
Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. ...
Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. ...
It categorizes intrusion, prohibits network traffic if required and notifies in real-time. ...
doi:10.5121/ijnsa.2013.5309
fatcat:dqutxw4xl5ewng3ea2ybimo6fm
Domestic Ecologies:
2010
IDEA Journal
This research investigates Pinter's rooms through a case study of a theatre set for one of his plays and textual analysis of selected works, developing an understanding of how Pinter's characters reflect ...
The room in pinter's work is a device through which the audience can reach a new understanding of this relationship between self and the domestic environment. ...
intruder as she interrupts the existing struggle for power within the house. perhaps though, ruth's claim for territory is not through action but association 14 . ...
doi:10.37113/ideaj.v0i0.124
fatcat:to3ieg77nngnvagabmpqbivwra
Efficient Anonymous Routing Protocols in Manets: A Survey
English
2014
International Journal of Computer Trends and Technology
English
Based on a route pseudonymity approach, ANODR prevents strong adversaries, such as node intruders and omnipresent eavesdroppers, from exposing local wireless transmitters' identities and tracing ad hoc ...
, adversaries, either en route or out of the route, cannot trace a packet flow back to its source or destination, and no node has information about the real identities and locations of intermediate nodes ...
doi:10.14445/22312803/ijctt-v11p105
fatcat:mpnplbnhrvdezezasium5jm5iy
Robustness Modelling and Verification of a Mix Net Protocol
[chapter]
2014
Lecture Notes in Computer Science
Re-encryption Mix Nets are used to provide anonymity by passing encrypted messages through a collection of servers which each permute and re-encrypt messages. ...
We model and analyse the protocol in the presence of a realistic intruder based on Roscoe and Goldsmith's perfect Spy [1]. ...
In our revised system, in the trace below, the intruder, acting as dishonest mix server A, times out without sending any message. ...
doi:10.1007/978-3-319-14054-4_9
fatcat:rxbjcxfbrzabjbw7id7ytqtwyi
Access for sale
2003
Proceedings of the 2003 ACM workshop on Rapid Malcode - WORM'03
The problem facing authors of this self-reproducing malware is that monetizing each intrusion requires the author to risk communication with the infected system or its owner. ...
If a worm's author attempts to trace the propagation of his creation through a network he risks detection through traffic analysis. ...
Much of the damage from existing worms has been limited to loss of service, resulting from inundations of traffic from the worms' replication mechanisms, and from repair time. ...
doi:10.1145/948187.948191
dblp:conf/worm/SchechterS03
fatcat:d7lqir7ux5amlchlqhcwjhhgr4
Analysis of Challenges in Modern Network Forensic Framework
2021
Security and Communication Networks
The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate ...
Some of the other vital features of the RAVEN architecture include non-real-time visual support in the real-time environment. ...
: forensics covers real-time and includes security for live network surveillance and its monitoring system. ...
doi:10.1155/2021/8871230
fatcat:nkrfvnk3vvdzxk5xihfzx7vrda
« Previous
Showing results 1 — 15 out of 5,978 results