21,359 Hits in 9.8 sec

Co-simulation for Cyber Security Analysis: Data Attacks against Energy Management System [article]

Kaikai Pan, André Teixeira, Claudio López, Peter Palensky
2017 arXiv   pre-print
In this paper we analyze the cyber security of energy management system (EMS) against data attacks.  ...  Second, we build a platform in the form of co-simulation - coupling the power system simulator DIgSILENT PowerFactory with communication network simulator OMNeT++, and Matlab for EMS applications (state  ...  Thus a robust BDD scheme could be developed against combined attacks, incorporating network properties with the latency of packets measured in the co-simulation platform.  ... 
arXiv:1708.08322v1 fatcat:rrskotjt45e73e6hc2oija2bjq

Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent System in MANETS

Bandana Mahapatra, Srikanta Patnaik
2017 International Journal of Electrical and Computer Engineering (IJECE)  
The vulnerability of Adhoc Network makes it susceptible to external attacks like flooding of hello messages or propagating fake routing messages etc.  ...  Most importantly cause agents to die when unable to reach destination due to fake routing messages causing a heavy loss on part of the nodes generating them to maintain the route knowledge.  ...  robust network capable of handling flooding attacks.  ... 
doi:10.11591/ijece.v7i2.pp919-925 fatcat:f7etd3vnhfe2lopdrbcusatea4

A Detection Method for Routing Attacks of Wireless Sensor Network Based on Fuzzy C-means Clustering

Tong Wang, Zhe Liang, Chunhui Zhao
2009 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery  
For the particularity and security threats of wireless sensor networks, we proposed an anomaly detection method based on Fuzzy C-means Clustering (FCM) to detect routing attacks caused by abnormal flows  ...  This paper analyzes the datas from network connections through the Fuzzy C-means Clustering methods to detect routing attacks, and the empirical evidence shows its efficiency and stability.  ...  It shows high accuracy with a low false positive rate for a variety of simulated routing attacks.  ... 
doi:10.1109/fskd.2009.567 dblp:conf/fskd/WangLZ09a fatcat:73yhugkvz5fkrmanxgcmekeiea

Mitigation of Cascading Failures with Link Weight Control

Hoang Anh, Akira Namatame
2014 International Journal of Advanced Computer Science and Applications  
The information flow and the routing patterns in a network are then controlled based on the assigned weights.  ...  Numerical results imply that network robustness can be enhanced significantly using the relevant smart routing strategy, in which loads in the network are properly redistributed.  ...  It indicates that we can significantly enhance network robustness against intentional attacks by choosing a proper routing strategy with  > 0, which transforms a network from heterogeneous state to homogeneous  ... 
doi:10.14569/ijacsa.2014.050706 fatcat:y2zyv236h5fnzmx7cr5svhlw64

Trusted routing vs. VPN for secured data transfer over IP-networks/Internet [article]

Osuolale Abdulrahamon Tiamiyu
2015 arXiv   pre-print
Though objectives of trusted routing and virtual private networks (VPN) data transfer methods are to guarantee data transfer securely to from senders to receivers over public networks like Internet yet  ...  there are paramount differences between the two methods.  ...  Some of the possible types of VPN attacks are attacks against VPN protocols, cryptanalysis attacks and denial-of -Service attacks.  ... 
arXiv:1509.00236v1 fatcat:cfubnhi4grgstojml3a4qa3ase

Analysis of critical node attacks in mobile ad hoc networks

Dongsheng Zhang, James P.G. Sterbenz
2014 2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM)  
Previously, we have modeled network attacks based on a priori complete knowledge of network structure and mobility.  ...  In this paper, we present the analysis of MANET behavior under random node failures and centralitybased attacks based on real-time topological information, and provide a comparison of network performance  ...  Ç etinkaya, and Siddharth Gangadhar for the review of the paper and other members of ResiliNets group for the discussions. This research was supported in part by NSF  ... 
doi:10.1109/rndm.2014.7014948 fatcat:d2kcx3775rgnzfcvva26ucmuj4

Weighted voting based trust management for intrusion tolerance in heterogeneous wireless sensor networks

P. Swaruba, V. Rishi Ganesh
2014 International Conference on Information Communication and Embedded Systems (ICICES2014)  
The present work bestowed redundancy management of heterogeneous wireless sensing element network s (HWSNs), utilizing multipath routing to answer user queries in presence of unreliable and malicious nodes  ...  Heterogeneous wireless sensing element network (heterogeneous WSN) consists of sensing element nodes with totally different ability, like totally different computing power and sensing vary.  ...  at the same time in one route discovery method.  ... 
doi:10.1109/icices.2014.7033898 fatcat:7tqtgnd3ije4ppsenfyhxvpsiy

Wireless Network Security Issues

Ashwani Kumar Ashwani Kumar, Ram Kumar Ram Kumar
2005 DESIDOC Bulletin of Information Technology  
The speed with which wireless networking has caught on is not surprising owing to large bandwidth and range of several hundred feet.  ...  Moreover multiple wireless access points can be easily installed on same network to cover more areas. Our main challenge in design of these networks is their exposure to security attacks.  ...  However none of them, to the best of our knowledge, have mechanisms to guard against malicious attacks.  ... 
doi:10.14429/dbit.25.1.3645 fatcat:rnafqcu2mja75poeap4s7dlzk4

An Iterative Security Game for Computing Robust and Adaptive Network Flows [article]

Supriyo Ghosh, Patrick Jaillet
2020 arXiv   pre-print
We show that the robust network flow problem to be solved by the defender is NP-hard and that the complexity of the adversary's decision problem grows exponentially with the network size and the adversary's  ...  We propose a robust and sustainable network flow model to effectively and proactively counter plausible attacking behaviors of an adversary operating under a budget constraint.  ...  Letμ k denote the attack k andx denote the robust flow strategy against these attacks.  ... 
arXiv:1911.10505v3 fatcat:du5kigre4fhbte55j3vbp3swx4


Benjamin I.P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar
2009 Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference - IMC '09  
method when under attack.  ...  We evaluate poisoning techniques and develop a defense, in the context of a particular anomaly detector-namely the PCA-subspace method for detecting anomalies in backbone networks.  ...  The opinions expressed in this paper are solely those of the authors and do not necessarily reflect the opinions of any funding agency, the State of California, or the U.S. government.  ... 
doi:10.1145/1644893.1644895 dblp:conf/imc/RubinsteinNHJLRTT09 fatcat:zdnrwkuobjej3e6z5wc3vm656q

Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks [article]

M. Razvi Doomun, K.M. Sunjiv Soyjaudah
2012 arXiv   pre-print
Moreover, ad hoc networks need stronger privacy protection against powerful global attacker which has knowledge of overall network topology and, that can also eavesdrop and visualize network wide data  ...  Existing solutions, such as incorporating fake source destination pairs in the network, provide some privacy of real source and destination nodes against attackers.  ...  Extended path adds robustness against physical attacks on the source and destination node, e.g. in military ad hoc networks in battlefield.  ... 
arXiv:1208.5569v1 fatcat:ekaqwsiokrc5jcyzuced4hb7he

Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs

Dorabella Santos, Amaro De Sousa, Carmen Mas-Machuca, Jacek Rak
2021 IEEE Access  
When a packet of a new traffic flow reaches a switch, it queries one controller which replies with the routing decision on how to forward the new traffic flow.  ...  All previous works dealing with attacks against multiple nodes, though, have considered that the attacker has complete knowledge of the network topology (i.e., attacks of targeted nature).  ...  Connectivity-based resilience, using WS1, of instances G5 (in dark colors) and G9 (in light colors) to T As against p = 1, ...10 nodes  ... 
doi:10.1109/access.2021.3071995 fatcat:2zx2dipxpzedhbtbhzaohlvaj4

Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol [chapter]

Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens
2006 Lecture Notes in Computer Science  
This notion was suggested in [16] as a means to improve the overall robustness of the network layer against general Byzantine attacks.  ...  Work on securing MANET routing protocols against Byzantine attacks falls into several categories, i.e., Passive Neighbor Monitoring Methods, Active Monitoring Methods and Active Monitoring with Fault Isolation  ... 
doi:10.1007/11964254_10 fatcat:espxlk6qsnchvjnwpa4nqmudti

Improving security and performance of an Ad Hoc network through a multipath routing strategy

Hervé Aiache, François Haettel, Laure Lebrun, Cédric Tavernier
2008 Journal in Computer Virology  
We propose in this paper a solution that provides at the anonymity, security to Ad Hoc network with a limited impact on QoS. This method could be efficient against some viral attacks.  ...  It is a challenge to address these issues in networks with strong constraints such as Ad Hoc network. The security increase is often obtained with a quality of service (QoS) decrease.  ...  We want to be robust against such attack. The main routing protocols, OLSR, AODV, DSR, GSR,CGSR, DSDV, SPREAD are vulnerable to the described attacks (see [3] ).  ... 
doi:10.1007/s11416-007-0072-y fatcat:5mswqvhfajhaxmcbu25vg2drse

A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks

Adnan Nadeem, Michael P. Howarth
2013 IEEE Communications Surveys and Tutorials  
We classify these mechanisms as either point detection algorithms that deal with a single type of attack, or as intrusion detection systems (IDSs) that can deal with a range of attacks.  ...  However, MANETs are vulnerable to various attacks at all layers, including in particular the network layer, because the design of most MANET routing protocols assumes that there is no malicious intruder  ...  The authors claim this method can detect various types of attacks but did not specify the attack scenarios against which it had been tested.  ... 
doi:10.1109/surv.2013.030713.00201 fatcat:g6zq7kiik5bflbldxhcl6nq6ja
« Previous Showing results 1 — 15 out of 21,359 results