Filters








94 Hits in 8.5 sec

Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A Systematic Review [article]

Lampis Alevizos, Vinh Thong Ta, Max Hashem Eiza
2021 arXiv   pre-print
To effectively detect such attacks, distributed collaborative intrusion detection systems with attack scenario-based approach have been developed.  ...  With the purpose of defending against lateral movement in todays borderless networks, Zero Trust Architecture (ZTA) adoption is gaining momentum.  ...  [52] proposed a collaborative host-based IDS approach, which detects network intrusion using distributed probabilistic inference.  ... 
arXiv:2104.00460v3 fatcat:mhlplek2hrbfnmyv3m4d7vfw74

Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions

M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, J. K. Kalita
2013 Computer journal  
Distributed Denial of Service attack is a coordinated attack, generally performed on a massive scale on the availability of services of a target system or network resources.  ...  In this paper, we present a comprehensive survey of DDoS attacks, detection methods and tools used in wired networks.  ...  ACKNOWLEDGMENT This work is supported by the Department of Information Technology and the Council of Scientific & Industrial Research (CSIR), Government of India.  ... 
doi:10.1093/comjnl/bxt031 fatcat:524xbef42jeolah3fisoayvf3y

A survey of context data distribution for mobile ubiquitous systems

Paolo Bellavista, Antonio Corradi, Mario Fanelli, Luca Foschini
2012 ACM Computing Surveys  
However, to the best of our knowledge, an in-depth analysis of the context data distribution, namely the function in charge of distributing context data to interested entities, is still missing.  ...  We present a unified architectural model and a new taxonomy for context data distribution, by considering and comparing a large number of solutions.  ...  For instance, when a fixed infrastructure is adopted as network deployment, selection-based approaches with either centralized or flat distributed routing overlay are the most common ones; instead, when  ... 
doi:10.1145/2333112.2333119 fatcat:ors3vkssnjhnld7zfqrmrugmnu

Botnet in DDoS Attacks: Trends and Challenges

Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita
2015 IEEE Communications Surveys and Tutorials  
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due to rapid development of computer networks and associated infrastructure, and millions of software applications  ...  Botnets pose a major threat to network security as they are widely used for many Internet crimes such as DDoS attacks, identity theft, email spamming, and click fraud.  ...  SITAR [135] : It is a scalable intrusion tolerance architecture designed for distributed services.  ... 
doi:10.1109/comst.2015.2457491 fatcat:oph4lgawmzbuvgygq4iagsr6eu

A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations

Mohammed Nasser Al-Mhiqani, Rabiah Ahmad, Z. Zainal Abidin, Warusia Yassin, Aslinda Hassan, Karrar Hameed Abdulkareem, Nabeel Salih Ali, Zahri Yunos
2020 Applied Sciences  
This phenomenon indicates that threats require special detection systems, methods, and tools, which entail the ability to facilitate accurate and fast detection of a malicious insider.  ...  of notable recent works on insider threat detection, which covers the analyzed behaviors, machine-learning techniques, dataset, detection methodology, and evaluation metrics.  ...  This quality makes it desirable when deployed in limited-resource platforms, such as the intrusion detection system node [64] .  ... 
doi:10.3390/app10155208 fatcat:xcgn37pohnaqlipqrhvwfrkgee

Distributed reinforcement learning for adaptive and robust network intrusion response

Kleanthis Malialis, Sam Devlin, Daniel Kudenko
2015 Connection science  
One of the most serious threats in the current Internet is posed by distributed denial of service (DDoS) attacks, which target the availability of the victim system.  ...  The increasing adoption of technologies and the exponential growth of networks has made the area of information technology an integral part of our lives, where network security plays a vital role.  ...  There is an extensive literature regarding the application of machine learning to intrusion detection, specifically anomaly detection where no action is performed beyond triggering an intrusion alarm when  ... 
doi:10.1080/09540091.2015.1031082 fatcat:vzwfb5cclzdqdhwgxzqozxe3xi

A Survey on Biologically Inspired Algorithms for Computer Networking

Chenyu Zheng, Douglas C. Sicker
2013 IEEE Communications Surveys and Tutorials  
The paper concludes by offering a framework for understanding the application of BIAs to problems in the computer networking space.  ...  This paper provides a comprehensive survey of BIAs for the computer networking field, in which different BIAs are organized and explored based on their: (1) biological source; (2) mathematical model; (  ...  The research field of BIAs for computer networking is full of potential to explore, and we anticipate that this paper will help to both advance and stimulate interest in this area.  ... 
doi:10.1109/surv.2013.010413.00175 fatcat:kl426uhbl5gahpqqprlxchu3yq

From biological and social network metaphors to coupled bio-social wireless networks

Christopher L. Barrett, Karthik Channakeshava, Stephen Eubank, V.S. Anil Kumar, Madhav V. Marathe
2011 International Journal of Autonomous and Adaptive Communications Systems  
We argue that we can better utilise the advances in our understanding of one class of networks to better our understanding of the other.  ...  We discuss how our work in these two applications is motivated by biological metaphors.  ...  The work on Cognitive Sensing and monitoring is a part of MS thesis written by Kashmira Phalak and Sameer Tupe.  ... 
doi:10.1504/ijaacs.2011.039720 pmid:21643462 pmcid:PMC3107043 fatcat:rgikxtpe7vhgzclliauury6p7a

An Introduction to Sensor Data Analytics [chapter]

Charu C. Aggarwal
2012 Managing and Mining Sensor Data  
., the mean of the Gaussian distribution in the future) is then considered as the inferred sensor value for sensor s j .  ...  A vast body of research work has utilized probabilistic models for computing inferred values.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
doi:10.1007/978-1-4614-6309-2_1 fatcat:pfbx566yfzgqpnjcuzonmxr23q

Dissemination and Harvesting of Urban Data Using Vehicular Sensing Platforms

Uichin Lee, E. Magistretti, M. Gerla, P. Bellavista, A. Corradi
2009 IEEE Transactions on Vehicular Technology  
data, thus making inapplicable already known solutions for sensor network data reporting.  ...  , iii) effects of concurrent exploitation of multiple harvesting agents with single/multi-hop communications, iv) evaluation of network overhead and overall system stability, and v) MobEyes validation  ...  We are also thankful to Giulio Galante for reviewing an earlier version of this manuscript.  ... 
doi:10.1109/tvt.2008.928899 fatcat:shlcm35ktng3zgwre6c242rtxy

A survey of sketches in traffic measurement: Design, Optimization, Application and Implementation [article]

Shangsen Li, Lailong Luo, Deke Guo, Qianzhen Zhang, Pengtao Fu
2021 arXiv   pre-print
We first introduce the preparation of flows for measurement, then detail the most recent investigations of design, aggregation, decoding, application and implementation of sketches for network measurement  ...  Then the space-efficient sketches from the distributed measurement nodes are aggregated to provide statistics of the undergoing flows.  ...  When performing HHH detection tasks, because the traffic keeps changing, we do not know the HHHs in advance, and there are not good rules to measure all the prefixes.  ... 
arXiv:2012.07214v2 fatcat:lme2ghsshje3tag2m5q3xgvcna

Table of contents

2009 2009 17th Mediterranean Conference on Control and Automation  
The second is the reduction of computational complexity when the number of IF-THEN rules r is control direction. The proposed adaptive neural network control is free of control singularity problem.  ...  In DCS system the control task is distributed among some controllers, which communicate to each other via communication network, such as PLC or/and industrial PC.  ...  In the proposed system, intrusion detection sensors are deployed on each container, and form a Wireless Sensor Network (WSN) to report intrusion incidents.  ... 
doi:10.1109/med.2009.5164498 fatcat:bi37lbkbhfaihj7lbc64vvplo4

Resource discovery for distributed computing systems: A comprehensive survey

Javad Zarrin, Rui L. Aguiar, João Paulo Barraca
2018 Journal of Parallel and Distributed Computing  
Large-scale distributed computing environments provide a vast amount of heterogeneous computing resources from different sources for resource sharing and distributed computing.  ...  In this paper, we provide an investigation on the current state of resource discovery protocols, mechanisms, and platforms for large-scale distributed environments, focusing on the design aspects.  ...  A query is considered to be successful when at least one existing resource, matching the query, is detected.  ... 
doi:10.1016/j.jpdc.2017.11.010 fatcat:v4dfsniptfgbxk6aswjjbtt7nu

Reducing Efficiency of Connectivity-Splitting Attack on Newscast via Limited Gossip [chapter]

Jakub Muszyński, Sébastien Varrette, Pascal Bouvry
2016 Lecture Notes in Computer Science  
This paper introduces the architecture of a distributed intrusion detection framework and in particular, the detector module based on a meta-ensemble, which is used to cope with the problem of detecting  ...  Setting optimal power and selection bias levels for small cells is key for good network performance.  ... 
doi:10.1007/978-3-319-31204-0_20 fatcat:27rnwllk75cv5kncys2u7utreq

Tracking with high-density, large-scale wireless sensor networks

Davide Merico
2010 Journal of Ambient Intelligence and Smart Environments  
My special thanks go to Alessandra Mileo and Torsten Schaub for inspiring discussions when working on the logic-based techniques and for their continuous support.  ...  He has been been a mentor, a guide, and a good friend.  ...  Executing the ranging process only when a movement is detected by the PIR motion sensor is a good method to achieve a proper compromise between accuracy and consumption.  ... 
doi:10.3233/ais-2010-0087 fatcat:urq6k3o4xjf2bodrotjbd5e5gi
« Previous Showing results 1 — 15 out of 94 results