Filters








5,978 Hits in 6.1 sec

Real-Time Intruder Tracing through Self-Replication [chapter]

Heejin Jang, Sangwook Kim
2002 Lecture Notes in Computer Science  
Therefore, it needs to trace the intruder in real time. Existing real-time intruder tracing systems has a spatial restriction.  ...  This paper proposes selfreplication mechanism, a new approach to real-time intruder tracing, minimizing a spatial limitation of traceable domain.  ...  Section 3 proposes the Self-Replication mechanism for real-time intruder tracing. Section 4 shows that the security domain for real-time tracing is extended through the Self-Replication.  ... 
doi:10.1007/3-540-45811-5_1 fatcat:6aacttpffzbajnm5du2c2gvvwy

SECURITY MECHANISM FOR MANETS

YASIR ABDELGADIR MOHAMED, AZWEEN B. ABDULLAH
2009 Journal of Engineering Science and Technology  
Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility.  ...  Coloured Petri Net model has been used to describe how different agents coordinate to protect the mobile ad hoc network from intruding and attack.  ...  Real-time approach is host-based and adopts the anomaly detection paradigm.  ... 
doaj:9cfa90dcca2040aaa7f85864176cb2fd fatcat:ptlckaar6vbhfpo7g6vyygrdtq

Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Salman Iqbal, Ahmed Abdelaziz, Omar Adil Mahdi, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Shiraz, Yusor Rafid Bahar Al-Mayouf, Ziar Khan, Kwangman Ko, Muhammad Khurram Khan (+1 others)
2016 IEEE Access  
Nevertheless, the significance of networks in cloud computing has drawn intruders to attack cloud networks through malicious attacks [8]-[10] such as illegal access, insertion of malicious code, modification  ...  In general, cloud computing is a connected resource through various distributed networks [3] .  ...  on a real-time basis.  ... 
doi:10.1109/access.2016.2631543 fatcat:vqsuwx4hdvcy7ogfsw3woernzq

Secrobat: Secure and Robust Component-based Architectures

Artem Vorobiev, Jun Han
2006 2006 13th Asia Pacific Software Engineering Conference (APSEC'06)  
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to "patch" them up.  ...  , there is a strong need for a systematic engineering approach to developing secure and robust systems, especially distributed systems, by considering functional and security requirements at the same time  ...  At the same time, if the difference between the significance number of the attacked peer and the real number of its replicated peer is more than 0, the system tries to create new copies of the attacked  ... 
doi:10.1109/apsec.2006.50 dblp:conf/apsec/VorobievH06 fatcat:b462o3f37ndydpw2a26usy4po4

A tamper-resistant framework for unambiguous detection of attacks in user space using process monitors

R. Chinchani, S. Upadhyaya, K. Kwiat
2003 First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings.  
An intruder could compromise any number of the available copies of a service resulting in a false sense of security.  ...  Replication and redundancy techniques rely on the assumption that a majority of components are always safe and voting is used to resolve any ambiguities.  ...  Implementation Issues The circulant digraph framework requires the implementation of a closed loop, where events or messages are delivered in real time.  ... 
doi:10.1109/iwias.2003.1192456 dblp:conf/iwia/ChinchaniUK03 fatcat:bxfngndwkncotptwjwn3orooh4

Detection of Security Attacks in Industrial IoT Networks: A Blockchain and Machine Learning Approach

Henry Vargas, Carlos Lozano-Garzon, Germán A. Montoya, Yezid Donoso
2021 Electronics  
The proposed solution achieved the proposed objectives and is presented as a viable mechanism for detecting and containing intruders in an IoT network.  ...  Taking into account its versatility, it is possible to carry out real implementations that can identify intruders in real time and contain them with little computational effort in networks as small and  ...  On the other hand, and for the test scenarios, data from the attacks defined in real time were used.  ... 
doi:10.3390/electronics10212662 fatcat:whs3qrfi2bhp5j7rdkjbv6tvx4

Ownership and Trade from Evolutionary Games [article]

Kenton K. Yee
2002 arXiv   pre-print
Half the time, the V -valuer is the owner, half the time the intruder.  ...  As a result of peer mimicry, the population establishes and self-enforces over time standards of normal behavior.  ... 
arXiv:physics/0210125v1 fatcat:vbee7p22ojb7daasm26ii4poeu

Ownership and Trade from Evolutionary Games

Kenton K. Yee
2002 Social Science Research Network  
Half the time, the V -valuer is the owner, half the time the intruder.  ...  As a result of peer mimicry, the population establishes and self-enforces over time standards of normal behavior.  ... 
doi:10.2139/ssrn.319102 fatcat:lwidxzq3njfmlewfg7usqx5fmu

Ownership and trade from evolutionary games

Kenton K. Yee
2003 International Review of Law and Economics  
Half the time, the V -valuer is the owner, half the time the intruder.  ...  As a result of peer mimicry, the population establishes and self-enforces over time standards of normal behavior.  ... 
doi:10.1016/s0144-8188(03)00026-7 fatcat:vhf67lza75em3pc2p5ckexjpia

Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks

Rajendra Aaseri, Pankaj Choudhary, Nirmal Roberts
2013 International journal of network security and its applications  
Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network.  ...  Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks.  ...  It categorizes intrusion, prohibits network traffic if required and notifies in real-time.  ... 
doi:10.5121/ijnsa.2013.5309 fatcat:dqutxw4xl5ewng3ea2ybimo6fm

Domestic Ecologies:

Kirsty Volz
2010 IDEA Journal  
This research investigates Pinter's rooms through a case study of a theatre set for one of his plays and textual analysis of selected works, developing an understanding of how Pinter's characters reflect  ...  The room in pinter's work is a device through which the audience can reach a new understanding of this relationship between self and the domestic environment.  ...  intruder as she interrupts the existing struggle for power within the house. perhaps though, ruth's claim for territory is not through action but association 14 .  ... 
doi:10.37113/ideaj.v0i0.124 fatcat:to3ieg77nngnvagabmpqbivwra

Efficient Anonymous Routing Protocols in Manets: A Survey
English

Jojy Saramma John, R Rajesh
2014 International Journal of Computer Trends and Technology  
Based on a route pseudonymity approach, ANODR prevents strong adversaries, such as node intruders and omnipresent eavesdroppers, from exposing local wireless transmitters' identities and tracing ad hoc  ...  , adversaries, either en route or out of the route, cannot trace a packet flow back to its source or destination, and no node has information about the real identities and locations of intermediate nodes  ... 
doi:10.14445/22312803/ijctt-v11p105 fatcat:mpnplbnhrvdezezasium5jm5iy

Robustness Modelling and Verification of a Mix Net Protocol [chapter]

Efstathios Stathakidis, Steve Schneider, James Heather
2014 Lecture Notes in Computer Science  
Re-encryption Mix Nets are used to provide anonymity by passing encrypted messages through a collection of servers which each permute and re-encrypt messages.  ...  We model and analyse the protocol in the presence of a realistic intruder based on Roscoe and Goldsmith's perfect Spy [1].  ...  In our revised system, in the trace below, the intruder, acting as dishonest mix server A, times out without sending any message.  ... 
doi:10.1007/978-3-319-14054-4_9 fatcat:rxbjcxfbrzabjbw7id7ytqtwyi

Access for sale

Stuart E. Schechter, Michael D. Smith
2003 Proceedings of the 2003 ACM workshop on Rapid Malcode - WORM'03  
The problem facing authors of this self-reproducing malware is that monetizing each intrusion requires the author to risk communication with the infected system or its owner.  ...  If a worm's author attempts to trace the propagation of his creation through a network he risks detection through traffic analysis.  ...  Much of the damage from existing worms has been limited to loss of service, resulting from inundations of traffic from the worms' replication mechanisms, and from repair time.  ... 
doi:10.1145/948187.948191 dblp:conf/worm/SchechterS03 fatcat:d7lqir7ux5amlchlqhcwjhhgr4

Analysis of Challenges in Modern Network Forensic Framework

Sirajuddin Qureshi, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, Ahsan Wajahat, Neetesh Saxena
2021 Security and Communication Networks  
The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate  ...  Some of the other vital features of the RAVEN architecture include non-real-time visual support in the real-time environment.  ...  : forensics covers real-time and includes security for live network surveillance and its monitoring system.  ... 
doi:10.1155/2021/8871230 fatcat:nkrfvnk3vvdzxk5xihfzx7vrda
« Previous Showing results 1 — 15 out of 5,978 results