Results 1 - 10
of
82
PROACTIVE NETWORK SECURITYAPPROACH FOR MULTILAYERED ARCHITECURE
"... Abstract-In order to fulfill the organization goals and objectives, multilayered network architecture and various heterogeneous server environments are used. As the network architectures are complex, there is an increased demand in information security. So each organization needs to provide sufficie ..."
Abstract
- Add to MetaCart
in order to handle the network vulnerabilities that are increasing day by day. So to handle this issue a proactive network strategy is proposed against network vulnerabilities such as fraud, information leakage, denial of service attack and so on. By this approach the network is scanned periodically
Before the Attack: A Typology of Strategies for Competitive Aggressiveness
"... We argue that a firm's competitive actions should flow from a strategy. Yet, the issue of strategy has seemingly been ignored in the competitive dynamics literature. To address that gap, we distinguish between the logics of innovativeness and competitive aggressiveness and build the foundation ..."
Abstract
- Add to MetaCart
in some capacity. Using a two-dimensional grid, we proposed four competitively aggressive strategies that a firm could use to attack its rival's resources. Based on a (1) firm's relative competitive comparative strength (i.e., its awareness of, motivation toward, and capability of executing
A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment
"... Abstract: Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and ..."
Abstract
- Add to MetaCart
and attackers get the access of core data centers, the availability of the critical resources becomes a big concern for the service consumers. Denial of Service and Distributed Denial of Service kind of attacks are launched towards cloud environment to make the resources unavailable for legitimate users
The Meaning of Attack-Resistant Systems ∗
"... In this paper, we introduce a formal notion of partial compliance, called ATTACK-RESISTANCE, of a computer program running to-gether with a defense mechanism w.r.t a non-exploitability speci-fication. In our setting, a program may contain exploitable vulner-abilities, such as buffer overflows, but a ..."
Abstract
- Add to MetaCart
In this paper, we introduce a formal notion of partial compliance, called ATTACK-RESISTANCE, of a computer program running to-gether with a defense mechanism w.r.t a non-exploitability speci-fication. In our setting, a program may contain exploitable vulner-abilities, such as buffer overflows
A Practical Approach to Intrusion Detection System for Multilayer Web Services
"... Abstract- The common technique to detect intrusion is based on behaviours. The primary objective of the system is to detect attacks in opposition to computer systems or against information systems. The proposed system is used to detect malicious actions in a session, analyze the traffic, and respond ..."
Abstract
- Add to MetaCart
Abstract- The common technique to detect intrusion is based on behaviours. The primary objective of the system is to detect attacks in opposition to computer systems or against information systems. The proposed system is used to detect malicious actions in a session, analyze the traffic
An Investigation about the Simulation of IP Traceback and Various IP Traceback Strategies
, 2008
"... Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. IP traceback – the ability to trace IP packets from source to destination – is a significant step toward identifying and, thus, stopping, attac ..."
Abstract
- Add to MetaCart
, attackers. The IP traceback is an important mechanism in defending against distributed denial-of-service (DDoS) attacks. This paper constructs a simulation environment via extending ns2, setting attacking topology and traffic, which can be used to evaluate and compare the effectiveness of different
Analyze and Determine the IP Spoofing Attacks Using Stackpath Identification Marking and Filtering Mechanism
"... Distributed denial of service is a major threat to the availability of internet services. DDoS attacks are stealthy; The Internet service provider (ISP) finds it when the new technique propose a defense mechanism, stack identification and marking (SPi & M), which the previous approaches are allo ..."
Abstract
- Add to MetaCart
address when calculating the bits to mark, they need not be repeated for each forwarded packet and also develop a new filter, the PiIP filter, which can be used to detect IP spoofing attacks with just a single attack packet. StackPi filtering can thus defend against not only DDoS attacks, but also many IP
Wireless Sensor Networking in Challenging Environments
, 2014
"... This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact ..."
Abstract
- Add to MetaCart
This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact
Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:
, 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract
- Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006
Towards Truthful Feedback in P2P Data Structures
"... Abstract. Peer-to-Peer data structures (P2P data structures) let a large number of anonymous peers share the data-management workload. A common assumption behind such systems is that peers behave cooperatively. But as with many distributed systems where participation is voluntary, and the participan ..."
Abstract
- Add to MetaCart
system. In this paper we propose and evaluate measures against spoof feedback in P2P data structures. While others have investigated mechanisms for truthtelling recently, we are not aware of any studies in P2P environments. The problem is more difficult in our context because detecting unreliable peers
Results 1 - 10
of
82