Search results for "attack"

showing 10 items of 221 documents

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments

2007

A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …

Exploitbusiness.industryComputer scienceLocal area networkNetwork interfaceIntrusion detection systemMan-in-the-middle attackComputer securitycomputer.software_genreTask (computing)Packet analyzerAddress Resolution ProtocolbusinesscomputerComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct

Immunization Strategies Based on the Overlapping Nodes in Networks with Community Structure

2016

International audience; Understanding how the network topology affects the spread of an epidemic is a main concern in order to develop efficient immunization strategies. While there is a great deal of work dealing with the macroscopic topological properties of the networks, few studies have been devoted to the influence of the community structure. Furthermore, while in many real-world networks communities may overlap, in these studies non-overlapping community structures are considered. In order to gain insight about the influence of the overlapping nodes in the epidemic process we conduct an empirical evaluation of basic deterministic immunization strategies based on the overlapping nodes.…

FOS: Computer and information sciencesTheoretical computer science[ INFO ] Computer Science [cs]Computer scienceProcess (engineering)Epidemic02 engineering and technologyNetwork topology01 natural sciencesComplex NetworksDiffusion020204 information systems0103 physical sciencesNode (computer science)[INFO.INFO-SY]Computer Science [cs]/Systems and Control [cs.SY]0202 electrical engineering electronic engineering information engineeringOverlapping community[INFO]Computer Science [cs]010306 general physicsSocial and Information Networks (cs.SI)Connected componentWelfare economicsCommunity structureComputer Science - Social and Information NetworksAttackImmunization (finance)Complex networkDynamicsMembership number[ INFO.INFO-SY ] Computer Science [cs]/Systems and Control [cs.SY]ImmunizationEpidemic model
researchProduct

A configurable rule based classful token bucket filter network request scheduler for the lustre file system

2017

HPC file systems today work in a best-effort manner where individual applications can flood the file system with requests, effectively leading to a denial of service for all other tasks. This paper presents a classful Token Bucket Filter (TBF) policy for the Lustre file system. The TBF enforces Remote Procedure Call (RPC) rate limitations based on (potentially complex) Quality of Service (QoS) rules. The QoS rules are enforced in Lustre's Object Storage Servers, where each request is assigned to an automatically created QoS class.The proposed QoS implementation for Lustre enables various features for each class including the support for high-priority and real-time requests even under heavy …

File systemComputer scienceQuality of service020206 networking & telecommunications020207 software engineeringDenial-of-service attackRule-based system02 engineering and technologycomputer.software_genreObject storageRemote procedure callServer0202 electrical engineering electronic engineering information engineeringOperating systemLustre (file system)computerProceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis
researchProduct

Firewall as a service in SDN OpenFlow network

2015

Protecting publicly available servers in internet today is a serious challenge, especially when encountering Distributed denial-of-service (DDoS) attacks. In traditional internet, there is narrow scope of choices one can take when ingress traffic overloads physical connection limits. This paper proposes Firewall as a service in internet service providers (ISP) networks allowing end users to request and install match-action rules in ISPs edge routers. In proposed scenario, ISP runs Software Defined Networking environment where control plane is separated from data plane utilizing OpenFlow protocol and ONOS controller. For interaction between end-users and SDN Controller author defines an Appl…

Firewall (construction)OpenFlowNetwork packetbusiness.industryComputer scienceServerComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSForwarding planeThe InternetDenial-of-service attackSoftware-defined networkingbusinessComputer network2015 IEEE 3rd Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

Turvaa ja turvattomuutta Ranskassa

2016

FrankrikesäkerhetsåtgärderturvallisuusarkiövervakningturvatoimetsamhällsskildringterrorismPariisiLille - Ranskajulkiset tilatresandeturvajärjestelmätterrorismisäkerhet och trygghetvardagyhteiskuntakuvausterrorattackerterrori-iskutEsittelyjä ja erittelyjävalvontaRanskaoffentliga lokalerturvattomuusmatkustaminenTiede & edistys
researchProduct

Development of a Taekwondo Combat Model Based on Markov Analysis

2019

The purpose of the present study was to examine male and female Olympic taekwondo competitors' movement patterns according to their tactical actions by applying a Markov processes analysis. To perform this study, 11,474 actions by male competitors and 12,980 actions by female competitors were compiled and analyzed. The results yielded 32 significant sequences among male competitors and 30 among female competitors. Male competitors demonstrated 11 sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive action. Female competitors demonstrated nine sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive move.…

Frequency of occurrenceVDP::Medisinske Fag: 700::Idrettsmedisinske fag: 850::Treningslære: 851combat sportslcsh:BF1-990Markov processComputer securitycomputer.software_genre050105 experimental psychologyCompetition (economics)03 medical and health sciencessymbols.namesake0302 clinical medicinePsychology0501 psychology and cognitive sciencesGeneral PsychologyOriginal ResearchMartial artsMarkov chainprobabilistic models05 social sciencesCompetitor analysisCounterattacklcsh:Psychologymartial artsstatisticssymbolstactical patternsPsychologyRelevant informationcomputer030217 neurology & neurosurgery
researchProduct

Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

2016

Distributed denial-of-service (DDoS) attacks are one of the most serious threats to today’s high-speed networks. These attacks can quickly incapacitate a targeted business, costing victims millions of dollars in lost revenue and productivity. In this paper, we present a novel method which allows us to timely detect application-layer DDoS attacks that utilize encrypted protocols by applying an anomaly-based approach to statistics extracted from network packets. The method involves construction of a model of normal user behavior with the help of weighted fuzzy clustering. The construction algorithm is self-adaptive and allows one to update the model every time when a new portion of network tr…

Fuzzy clusteringbusiness.industryNetwork securityComputer scienceNetwork packet05 social sciencesDenial-of-service attack02 engineering and technologyIntrusion detection systemEncryption0502 economics and business0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionActivity-based costingbusiness050203 business & managementComputer network
researchProduct

GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices–A Cybersecurity Pentesting Perspective

2022

As the core part of next-generation air transportation systems, the Automatic Dependent Surveillance-Broadcast (ADS-B) is becoming very popular. However, many (if not most) ADS-B devices and implementations support and rely on Garmin’s GDL-90 protocol for data exchange and encapsulation. In this paper, we research GDL-90 protocol fuzzing options and demonstrate practical Denial-of-Service (DoS) attacks on popular Electronic Flight Bag (EFB) software operating on mobile devices. For this purpose, we specifically configured our own avionics pentesting platform. and targeted the popular Garmin’s GDL-90 protocol as the industry-leading devices operate on it. We captured legitimate traffic from …

General Computer Sciencecybersecurityprotocolsaerospace electronicsavionicsattacksheart beatGeneral Materials SciencelennonjohtokyberturvallisuussoftwareGeneral EngineeringlentoliikenneresiliencyfuzzingtestausmenetelmätpentestingairtrafficaviationstandardsDoSaircraftverkkohyökkäyksetlennonvarmistusGDL-90ADS-BIEEE Access
researchProduct

Distance from the nearest hospital and mortality for acute miocardial infarction (AMI) in Sicily Region (Southern Italy)

2014

Heart attackHospital locationSettore SECS-S/05 - Statistica SocialeGIS
researchProduct

Vulnerability Analysis of Interdependent Critical Infrastructures upon a Cyber-attack

2019

InterdependenceComputer scienceVulnerability assessmentmedia_common.quotation_subjectCyber-attackCascading effectsScenario analysisComputer securitycomputer.software_genrecomputerSystem dynamicsmedia_commonProceedings of the Annual Hawaii International Conference on System Sciences
researchProduct