• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,136
Next 10 →

Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks

by Yih-chun Hu , 2003
"... Abstract — As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has n ..."
Abstract - Cited by 703 (15 self) - Add to MetaCart
attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find

Sybilguard: Defending against sybil attacks via social networks

by Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman - In ACM SIGCOMM ’06 , 2006
"... Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the syst ..."
Abstract - Cited by 331 (6 self) - Add to MetaCart
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes

The Sybil attack in sensor networks: Analysis & Defenses

by James Newsome, Elaine Shi, Dawn Song, Adrian Perrig - THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, IPSN, 26 – 27 APRIL 2004 PAGE(S): 259 – 268 , 2004
"... Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper system-atically analyzes the threat posed by the Sybil attack to wireless ..."
Abstract - Cited by 392 (1 self) - Add to MetaCart
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper system-atically analyzes the threat posed by the Sybil attack to wireless

Implementing Pushback: Router-Based Defense Against DDoS Attacks

by John Ioannidis, Steven M. Bellovin - In Proceedings of Network and Distributed System Security Symposium , 2002
"... Pushback is a mechanism for defending against distributed denial-of-service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by th ..."
Abstract - Cited by 355 (4 self) - Add to MetaCart
Pushback is a mechanism for defending against distributed denial-of-service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled

Practical Byzantine fault tolerance and proactive recovery

by Miguel Castro, Barbara Liskov - ACM Transactions on Computer Systems , 2002
"... Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, B ..."
Abstract - Cited by 410 (7 self) - Add to MetaCart
, it incorporates mechanisms to defend against Byzantine-faulty clients, and it recovers replicas proactively. The recovery mechanism allows the algorithm to tolerate any number of faults over the lifetime of the system provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability

Remote Timing Attacks are Practical

by David Brumley, Dan Boneh
"... Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running ..."
Abstract - Cited by 248 (4 self) - Add to MetaCart
on a machine in the local network. Our results demonstrate that timing attacks against network servers are practical and therefore security systems should defend against them.

Reputation Based Scheme for Defending against DoS Attacks in MANET

by unknown authors
"... Mobile Ad Hoc Networks are the set of mobile hosts operating without the aid of the established infrastructure of centralized administration. Due to lack of infrastructure, the network can be easily affected by several attacks. In addition to node mobility, a MANET is characterized by limited resour ..."
Abstract - Add to MetaCart
system. Here, each node would evaluate nodes recommendation, route id and threshold packet dropping ratio. The proposed reputation system is evaluated with discrete event simulator environment. Simulation results shows that the reputation based system detects and isolates the DoS attack and provides

Adaptive Early Packet Filtering for Defending Firewalls against DoS Attacks

by Adel El-atawy, Ehab Al-shaer, Tung Tran, Raouf Boutaba
"... Abstract—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rules before being rejected by the default deny rule. An attacker with some information about the access-control list (AC ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rules before being rejected by the default deny rule. An attacker with some information about the access-control list

SecureCPS:   Defending  a  Nanosatellite  Cyber-Physical  System

by Lance Forbes, Huy Vu, Bogdan Udrea, Hamilton Hagar, Xenofon D. Koutsoukos, Mark Yampolskiy
"... Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten high-value assets (HVA) on-orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites ..."
Abstract - Add to MetaCart
with maneuvering capability is challenging due to extreme cost, size, and power constraints. Our low-cost SecureCPS architecture dramatically improves security, to include adapting and preempting most attacks in a nanosatellite. SecureCPS also applies to a broad class of cyber-physical systems (CPS

MODELING VULNERABILITIES IN CYBER-PHYSICAL SPACES by

by Keith Mcvey
"... There is continuing growth in the need to secure critical infrastructures from malicious adversaries. These adversaries can attack systems from different forms. They can physically break in and steal something important, or they can attack from the cyber realm in order to steal critical information. ..."
Abstract - Add to MetaCart
There is continuing growth in the need to secure critical infrastructures from malicious adversaries. These adversaries can attack systems from different forms. They can physically break in and steal something important, or they can attack from the cyber realm in order to steal critical information
Next 10 →
Results 1 - 10 of 1,136
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University