Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,516 Hits in 5.0 sec

Online Sketching of Network Flows for Real-Time Stepping-Stone Detection

Baris Coskun, Nasir Memon
2009 2009 Annual Computer Security Applications Conference  
We present an efficient and robust stepping-stone detection scheme based on succinct packet-timing sketches of network flows.  ...  These sketches are then used to identify pairs of network flows with similar packet-timing characteristics, which indicates potential stepping-stones.  ...  INTRODUCTION We consider the real-time network-based stepping-stone detection problem.  ... 
doi:10.1109/acsac.2009.51 dblp:conf/acsac/CoskunM09 fatcat:mizoclnfvbhrbkat6x6qjuwdli

DDOS Attack Detection on Wireless Sensor Network using DSR Algorithm with Cryptography

Amandeep Kaur, Daljeet Kaur, Gagandeep G.
2017 International Journal of Computer Applications  
Since DDoS attacks will greatly degrade the performance of the network and square measure troublesome to find, they need become one amongst the foremost serious security challenges to this intrusion detection  ...  Base station (BS) Apply HEED for maintaining the energy and RTBDG for data transmission  ...  be utilized in online detection, thanks to time and area complexities.  ... 
doi:10.5120/ijca2017915481 fatcat:k46o57kfmrfcnmrrnc32ps5mva

Design of System for Monitoring Seepage of Levee Engineering Based on Distributed Optical Fiber Sensing Technology

Huaizhi Su, Yeyuan Kang
2013 International Journal of Distributed Sensor Networks  
Leakage may be undetected by conventional monitoring methods and techniques, but optical fiber distributed temperature sensor (DTS) temperature measuring system can achieve real-time temperature monitoring  ...  in internal soil of levees.  ...  , real-time, online, and whole section monitoring of levee temperature field and strain field.  ... 
doi:10.1155/2013/358784 fatcat:otw5bsuqzfcpzko3ry4b2l5phi

Tracking encrypted VoIP calls via robust hashing of network flows

Baris Coskun, Nasir Memon
2010 2010 IEEE International Conference on Acoustics, Speech and Signal Processing  
These robust hashes are then used to detect pairs of parties communicating with each other.  ...  The basic intuition behind the proposed hash function is twofolds: i)The variable bitrate codec employed in most VoIP applications result in a distinctive bitrate variations over time for each VoIP flow  ...  Similar to robust hashing, in [5] , Coskun and Memon propose a flow sketch to identify packet-timing characteristics of network flows for real time stepping-stone detection.  ... 
doi:10.1109/icassp.2010.5495398 dblp:conf/icassp/CoskunM10 fatcat:dgezpm3yhfc27d2l2dypnvdwby

Tracing Information Flows Between Ad Exchanges Using Retargeted Ads [article]

Muhammad Ahmad Bashir, Sajjad Arshad, William Robertson, Christo Wilson
2020 arXiv   pre-print
Our key insight is to leverage retargeted ads as a tool for identifying information flows.  ...  In this study, we develop a methodology that is able to detect client- and server-side flows of information between arbitrary ad exchanges.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF.  ... 
arXiv:1811.00920v2 fatcat:vxphbqdyujcwjfmgld3pg22bwm

High-level modelling of critical infrastructures' interdependencies

Simon Delamare, Alpha Amadou Diallo, Claude Chaudet
2009 International Journal of Critical Infrastructures  
His research interests include understanding and proposing solutions for the security of critical infrastructures.  ...  In this article, we study the potential effect of interdependencies that may occur between two of these infrastructures: the telecommunication networks and the electrical network.  ...  of the electrical flow is detected.  ... 
doi:10.1504/ijcis.2009.022852 fatcat:dk57plz7z5ayfamxq4x5fijctu

A Survey on Deep Reinforcement Learning Network for Traffic Light Cycle Control

V. Indhumathi, K. Kumar
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
A Traffic signal control is a challenging problem and to minimize the travel time of vehicles by coordinating their movements at the road intersections.  ...  of intelligent transportation.  ...  For the former, recent advances in sensor and networking technology enables taking real-time traffic information as input, such as the number of vehicles, the locations of vehicles, and their waiting time  ... 
doi:10.32628/cseit206458 fatcat:iyp2r73tqjdq5pqpvxv77mrdra

The Practice of Agent-Based Model Visualization

Alan Dorin, Nicholas Geard
2014 Artificial Life  
Visualizations used here ought to be rapidly produced sketches, their development matching the flow of ideas.  ...  A pencil sketch is great and can easily set the course for years of future work!  ...  and material flow visualized in the form of networks.  ... 
doi:10.1162/artl_a_00129 pmid:24494616 fatcat:t437ls7oyjf5tp4zbcklkk6afi

On Scalable Attack Detection in the Network

Ramana Rao Kompella, Sumeet Singh, George Varghese
2007 IEEE/ACM Transactions on Networking  
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points.  ...  Unfortunately, all the IDS systems we know of keep per-connection or per-flow state.  ...  We would like to thank Colleen Shannon, David Moore, Andre Broido for their immense help with the OC-48 traces. We would also like to thank the anonymous reviewers for their comments.  ... 
doi:10.1109/tnet.2006.890115 fatcat:ebx7l7itzrhk5e6hs7ssfurspi

On scalable attack detection in the network

Ramana Rao Kompella, Sumeet Singh, George Varghese
2004 Proceedings of the 4th ACM SIGCOMM conference on Internet measurement - IMC '04  
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points.  ...  Unfortunately, all the IDS systems we know of keep per-connection or per-flow state.  ...  We would like to thank Colleen Shannon, David Moore, Andre Broido for their immense help with the OC-48 traces. We would also like to thank the anonymous reviewers for their comments.  ... 
doi:10.1145/1028788.1028812 dblp:conf/imc/KompellaSV04 fatcat:j5c3rnnlnra5por3sk4324zqtm

The Embedding Capacity of Information Flows Under Renewal Traffic

Stefano Marano, Vincenzo Matta, Ting He, Lang Tong
2013 IEEE Transactions on Information Theory  
We evaluate our solution on real network traces, which shows a noticeable match for tight delay constraints.  ...  ., secure networking, a meaningful matching rule is that of a maximum causal delay, and the problem is related to embedding a flow of packets in cover traffic such that no traffic analysis can detect it  ...  the fact of relaying, which is often an indicator of network attacks (such as stepping-stone attacks [5] , [6] ).  ... 
doi:10.1109/tit.2012.2227672 fatcat:s6yfji4t6fe4rdlpe5djp7ao5q

MANAGEMENT AND SEGREGATION OF GARBAGE BINS AUTOMATION

G.Sakthivel, M.Gokila
2022 Zenodo  
Waste Management involves planning, financing, construction and operation of facilities for the collection, transportation, recycling and final disposition of the waste.  ...  Every five years the waste generated is rising by 1 million tons, In case it is not disposed within a stipulated time, it tends to create serious health hazards and reflects negatively on the infrastructure  ...  The time overhead is sometimes measured as the percentage of CPU time needed for memory management. For real-time systems this measure alone is not an adequate measure of the overhead.  ... 
doi:10.5281/zenodo.6400667 fatcat:mgr66objcbaqxf2juyujqbw3k4

SoK: Making Sense of Censorship Resistance Systems

Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg
2016 Proceedings on Privacy Enhancing Technologies  
We do this for each of the functional phases that we identify for censorship resistance systems: communication establishment, which involves distribution and retrieval of information necessary for a client  ...  To this end, we first sketch a comprehensive attack model to set out the censor's capabilities, coupled with discussion on the scope of censorship, and the dynamics that influence the censor's decision  ...  and flow timing.  ... 
doi:10.1515/popets-2016-0028 dblp:journals/popets/KhattakESSMG16 fatcat:qy2wv24bqbgnbgqao7whndrihq

Evaluating Collaboration Effectiveness of Patient-to-Doctor Interaction in a Healthcare Territorial Network [chapter]

Dario Antonelli, Dario Bellomo, Giulia Bruno, Agostino Villa
2012 IFIP Advances in Information and Communication Technology  
The emerging crucial point of healthcare organizations is to involve patients in autonomous monitoring their own health status by using personal ICT-based systems to manage data, and to ask for an effective  ...  doctor in case of a critical or suspicious health situation.  ...  real-time feedback to the user and medical personnel.  ... 
doi:10.1007/978-3-642-32775-9_13 fatcat:owululwosvgqtdq6pzyk4t7n5y

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

Mina Deng, Kim Wuyts, Riccardo Scandariato, Bart Preneel, Wouter Joosen
2010 Requirements Engineering  
Analogous to STRIDE, an information flow oriented model of the system is leveraged to guide the analysis and to provide broad coverage.  ...  Therefore, the selection of sound privacy countermeasures is simplified.  ...  Detectability of data flow The threat tree of detectability of data flow, as depicted in Figure 15 suggests five preconditions for the threat to occur.  ... 
doi:10.1007/s00766-010-0115-7 fatcat:pecasx6ohbbphjgemhilttt5re
« Previous Showing results 1 — 15 out of 4,516 results