Search results for "attack"

showing 10 items of 221 documents

Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme

2017

Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…

Routing protocolDistance-vector routing protocolRobustness (computer science)business.industryPacket drop attackAd hoc On-Demand Distance Vector RoutingComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAnomaly detectionMobile ad hoc networkbusinessComputer networkNetwork simulation2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)
researchProduct

SDN controllers security issues

2017

Software-Defined Networking (SDN) is essentially varying the way we design and manage networks, which makes a communication network programmable. In SDN, a logically centralized controller has straight control over the packet-handling functions of the network switches, using a standard, open API (Application Programming Interface) such as OpenFlow. OpenFlow is a broadly used protocol for software-defined networks (SDNs) that presents a new model in which the control plane is inattentive from the forwarding plane for the network devices. In SDN approach centralized entities called "controllers" perform like network operating systems run dissimilar applications that accomplish and control the…

SDNSDN controllersohjelmistotOpenFlow-protokollasoftware defined networkingDoS attacksOpenFlow Controllerohjaimetcomputer networkssuojaustietoturvatietoverkot
researchProduct

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

2013

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…

Security analysisInformation Systems and ManagementComputer Networks and Communicationsbusiness.industryInternet privacyComputer securitycomputer.software_genreHardware and ArchitectureNational Strategy to Secure CyberspaceCyber-attackBusinessSafety Risk Reliability and QualityCyberspaceSafety ResearchcomputerComputingMilieux_MISCELLANEOUSSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids

2022

Modern power systems are continuously exposed to malicious cyber-attacks. Analyzing industrial control system (ICS) traffic data plays a central role in detecting and defending against cyber-attacks. Detection approaches based on system modeling require effectively modeling the complex behavior of the critical infrastructures, which remains a challenge, especially for large-scale systems. Alternatively, data-driven approaches which rely on data collected from the inspected system have become appealing due to the availability of big data that supports machine learning methods to achieve outstanding performance. This chapter presents an enhanced cyber-attack detection strategy using unlabeled…

Semi-supervised methods[SPI] Engineering Sciences [physics]Deep learningAnomaly detectionCyber-attack detectionProtocol IEC 104
researchProduct

MODERN VOLLEYBALL ANALYSIS AND TRAINING PERIODIZATION

2018

The purpose of this study is to clarify the scientific approach to modern volleyball at men´s high-level and introduce the most influential studies, which still are not very well implemented in the world of volleyball. On individual level, requirements of modern volleyball consist psychological aspects like inner motivational and maintaining the focus during the game, which is difficult because there are a lot of breaks and successful and unsuccessful rallies in every volleyball match. Inner motivated player can push himself easier to the limits of his capacity during the game. Good focus and team routines keep the difference between won and lost rally small so that the player and the team …

Serve/receiveModern volleyballPhysiologyMotor learningProductive skillNon-linear periodizationCounter-productive skillPsychologyAttackServingAnalysisReading the game
researchProduct

Adversarial Machine Learning in e-Health: Attacking a Smart Prescription System

2022

Machine learning (ML) algorithms are the basis of many services we rely on in our everyday life. For this reason, a new research line has recently emerged with the aim of investigating how ML can be misled by adversarial examples. In this paper we address an e-health scenario in which an automatic system for prescriptions can be deceived by inputs forged to subvert the model's prediction. In particular, we present an algorithm capable of generating a precise sequence of moves that the adversary has to take in order to elude the automatic prescription service. Experimental analyses performed on a real dataset of patients' clinical records show that a minimal alteration of the clinical record…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAdversarial Machine Learning Healthcare Evasion attacks
researchProduct

Vulnerability evaluation of distributed reputation management systems

2017

In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSecurity attackComputer sciencemedia_common.quotation_subjectVulnerability020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreSet (abstract data type)Parallel simulationTrustworthinessDistributed reputation management020204 information systemsVulnerability evaluation0202 electrical engineering electronic engineering information engineeringData miningCommunications protocolcomputerInstrumentationReputation managementEvaluation metricReputationmedia_common
researchProduct

Gastrooesophageal reflux and "Epileptic" attacks: casually associated or related? Efficiency of antireflux surgery, a case report

2012

P02.30 GASTRO-OESOPHAGEAL REFLUX AND “EPILEPTIC” ATTACKS: CASUALLY ASSOCIATED OR RELATED? EFFICIENCY OF ANTIREFLUX SURGERY A CASE REPORT Achille Mastrosimone1, Alessia Cusimano2, Silvia Marino2, Gianni Pantuso2, Eugenio Fiorentino2 1Policlinico Of Palermo, Palermo/ITALY, 2University Of Palermo, Palermo/ITALY Background: Although a possible link between gastro-oesophageal reflux disease (GORD) and obstructive sleeping apnoea has already been reported in the literature, there has never been any suggestion of an association with epilepsy, and epileptic attacks have not so far been included among gastro- oesophageal reflux disease symptoms. Methods: We report the case of a patient with gastro-o…

Settore MED/18 - Chirurgia GeneraleReflusso Epileptic attack Hiatal hernia
researchProduct

Honeypot Utilization for Network Intrusion Detection

2018

For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…

Software_OPERATINGSYSTEMSDictionary attackHoneypotComputer science020206 networking & telecommunications02 engineering and technology021001 nanoscience & nanotechnologycomputer.software_genreComputer securityLoginComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringMalwareNetwork intrusion detection0210 nano-technologycomputerSecurity system
researchProduct

Evaluation of the Possible Impact of Care Network for Stroke and Transient Ischemic Attack on Rates of Recurrence

2011

International audience

StrokeIschemic Attack[ SHS.ECO ] Humanities and Social Sciences/Economies and financesImpact of care network[SHS.ECO] Humanities and Social Sciences/Economics and Finance[SHS.ECO]Humanities and Social Sciences/Economics and FinanceComputingMilieux_MISCELLANEOUS
researchProduct