• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 82
Next 10 →

PROACTIVE NETWORK SECURITYAPPROACH FOR MULTILAYERED ARCHITECURE

by Lalitha Kumari R, Priyanka M, Lizyflorance C, Prof John Singh K, Assistant Professor –selection Grade
"... Abstract-In order to fulfill the organization goals and objectives, multilayered network architecture and various heterogeneous server environments are used. As the network architectures are complex, there is an increased demand in information security. So each organization needs to provide sufficie ..."
Abstract - Add to MetaCart
in order to handle the network vulnerabilities that are increasing day by day. So to handle this issue a proactive network strategy is proposed against network vulnerabilities such as fraud, information leakage, denial of service attack and so on. By this approach the network is scanned periodically

Before the Attack: A Typology of Strategies for Competitive Aggressiveness

by Jeffrey E Stambaugh , Andy Yu , Alan J Dubinsky
"... We argue that a firm's competitive actions should flow from a strategy. Yet, the issue of strategy has seemingly been ignored in the competitive dynamics literature. To address that gap, we distinguish between the logics of innovativeness and competitive aggressiveness and build the foundation ..."
Abstract - Add to MetaCart
in some capacity. Using a two-dimensional grid, we proposed four competitively aggressive strategies that a firm could use to attack its rival's resources. Based on a (1) firm's relative competitive comparative strength (i.e., its awareness of, motivation toward, and capability of executing

A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment

by N. Ch. S. N. Iyengar, Arindam Banerjee, Gopinath Ganapathy
"... Abstract: Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and ..."
Abstract - Add to MetaCart
and attackers get the access of core data centers, the availability of the critical resources becomes a big concern for the service consumers. Denial of Service and Distributed Denial of Service kind of attacks are launched towards cloud environment to make the resources unavailable for legitimate users

The Meaning of Attack-Resistant Systems ∗

by Vijay Ganesh, Sebastian Banescu
"... In this paper, we introduce a formal notion of partial compliance, called ATTACK-RESISTANCE, of a computer program running to-gether with a defense mechanism w.r.t a non-exploitability speci-fication. In our setting, a program may contain exploitable vulner-abilities, such as buffer overflows, but a ..."
Abstract - Add to MetaCart
In this paper, we introduce a formal notion of partial compliance, called ATTACK-RESISTANCE, of a computer program running to-gether with a defense mechanism w.r.t a non-exploitability speci-fication. In our setting, a program may contain exploitable vulner-abilities, such as buffer overflows

A Practical Approach to Intrusion Detection System for Multilayer Web Services

by Prakash Kalavadekar, Vishal Mogal
"... Abstract- The common technique to detect intrusion is based on behaviours. The primary objective of the system is to detect attacks in opposition to computer systems or against information systems. The proposed system is used to detect malicious actions in a session, analyze the traffic, and respond ..."
Abstract - Add to MetaCart
Abstract- The common technique to detect intrusion is based on behaviours. The primary objective of the system is to detect attacks in opposition to computer systems or against information systems. The proposed system is used to detect malicious actions in a session, analyze the traffic

An Investigation about the Simulation of IP Traceback and Various IP Traceback Strategies

by S. Karthik Dr , 2008
"... Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. IP traceback – the ability to trace IP packets from source to destination – is a significant step toward identifying and, thus, stopping, attac ..."
Abstract - Add to MetaCart
, attackers. The IP traceback is an important mechanism in defending against distributed denial-of-service (DDoS) attacks. This paper constructs a simulation environment via extending ns2, setting attacking topology and traffic, which can be used to evaluate and compare the effectiveness of different

Analyze and Determine the IP Spoofing Attacks Using Stackpath Identification Marking and Filtering Mechanism

by V. Shyamaladevi, Dr. R. S. D Wahidabanu
"... Distributed denial of service is a major threat to the availability of internet services. DDoS attacks are stealthy; The Internet service provider (ISP) finds it when the new technique propose a defense mechanism, stack identification and marking (SPi & M), which the previous approaches are allo ..."
Abstract - Add to MetaCart
address when calculating the bits to mark, they need not be repeated for each forwarded packet and also develop a new filter, the PiIP filter, which can be used to detect IP spoofing attacks with just a single attack packet. StackPi filtering can thus defend against not only DDoS attacks, but also many IP

Wireless Sensor Networking in Challenging Environments

by Mo Sha, Raj Jain, Jonathan Turner, Guoliang Xing, Mo Sha , 2014
"... This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact ..."
Abstract - Add to MetaCart
This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact

Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:

by Sebastian Fritsch, Dipl Ing, Vangelis Karatsiolis Erklärung , 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract - Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006

Towards Truthful Feedback in P2P Data Structures

by Erik Buchmann, Klemens Böhm, Christian Von Der Weth
"... Abstract. Peer-to-Peer data structures (P2P data structures) let a large number of anonymous peers share the data-management workload. A common assumption behind such systems is that peers behave cooperatively. But as with many distributed systems where participation is voluntary, and the participan ..."
Abstract - Add to MetaCart
system. In this paper we propose and evaluate measures against spoof feedback in P2P data structures. While others have investigated mechanisms for truthtelling recently, we are not aware of any studies in P2P environments. The problem is more difficult in our context because detecting unreliable peers
Next 10 →
Results 1 - 10 of 82
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University