• No results found

Malicious Attacks

Security to wireless sensor networks against malicious attacks using Hamming residue method

Security to wireless sensor networks against malicious attacks using Hamming residue method

... In the art of work, the research provides different ap- proaches to secure the communication in WSN. Crypt- ography is one of the common solutions for providing security. In this method, the key is distributed among the ...

7

Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks

Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks

... against malicious attacks in mobile ad hoc networks ...as malicious. Upon detecting malicious node, the active node sends an alert message to the source ...the malicious nodes in that ...

7

Modelling based approach for reconstructing evidence of VoIP malicious attacks

Modelling based approach for reconstructing evidence of VoIP malicious attacks

... Voice over Internet Protocol (VoIP) is a new communication technology that uses internet protocol in providing phone services. VoIP provides various forms of benefits such as low monthly fee and cheaper rate in terms of ...

18

Survey of Malicious Attacks in MANET

Survey of Malicious Attacks in MANET

... few attacks along with a latest survey of existing solutions are categorized and ...of malicious attack in MANET but every proposal has some limitations in their respected ...The malicious attack is ...

5

COMMON TYPES OF MALICIOUS ATTACKS FOR WEB USERS

COMMON TYPES OF MALICIOUS ATTACKS FOR WEB USERS

... was malicious attacks on web. By these attacks no one has been ...of malicious attacks and their behavior/effects on web ...Common Malicious Attacks, Clustering, Behavior/ ...

7

Secure Data Transmission from Malicious Attacks: A Review

Secure Data Transmission from Malicious Attacks: A Review

... of-service. Malicious attack is one of many possible attacks in AODV-based ...a malicious node sends a forged route reply (RREP) packet to source node that initiates the route discovery in order to ...

5

Architecture of Host Based Intrusion Detection System For Detecting Malicious Attacks

Architecture of Host Based Intrusion Detection System For Detecting Malicious Attacks

... Intrusion detection system plays exactly this role of detecting if the machine is sacrificed or not. Intrusion detection what truly does is that it scans the incoming network packets. Then it matches them with fixed ...

7

Architecture of Host Based Intrusion Detection System for Detecting Malicious Attacks

Architecture of Host Based Intrusion Detection System for Detecting Malicious Attacks

... With the ever increasing computing and communication resources there is also a striking increase in the number of attacks on these resources. It has become a rudimentary necessity to ensure the security in the ...

7

Protecting web content integrity from malicious attacks

Protecting web content integrity from malicious attacks

... the malicious acts of attackers and intruders on Client ...Cyber Attacks and to ensure the safe operation of web systems by dynamically monitoring the integrity of a Web site’s content on ...

5

A Malicious Attacks and Defense Techniques on Android Based Smartphone Platform

A Malicious Attacks and Defense Techniques on Android Based Smartphone Platform

... cyber- attacks targeted towards Andorid ...various attacks reported with respect to Android and have also gathered different type of defenses available to protect users from these ...

9

Are blockchains immune to all malicious attacks?

Are blockchains immune to all malicious attacks?

... Fraud is a type of malicious activity intended to obtain advantage or benefit by de- ceiving others. Fraud may cause serious consequences and losses to its victims and has long concerned the financial industry. ...

9

Deducing Malicious Attacks in Disruption Tolerant Networks

Deducing Malicious Attacks in Disruption Tolerant Networks

... contention in the network, increase overall delays, and drain each mobile node's limited battery supply. A new DTN routing algorithm was proposed called Encounter-Based Routing (EBR), which maximizes delivery ratios ...

6

Detecting Malicious Attacks in Facebook Applications

Detecting Malicious Attacks in Facebook Applications

... We were surprisedto find popular good apps, such as ‘FarmVille’ and ‘Facebookfor iPhone’, posting malicious posts. On further investigation,we found a lax authentication rule in Facebook that enabledhackers to ...

7

Survey of Detection and Localization of Multiple Spoofing Attacks in Wireless Networks

Survey of Detection and Localization of Multiple Spoofing Attacks in Wireless Networks

... spoofing attacks where an attacker forges its identity to masquerade as another device, or even creates multiple illegitimate ...Spoofing attacks are a serious threat as they represent a form of identity ...

5

An effective fault tolerance method for 
		collaborative editing with fickle operations

An effective fault tolerance method for collaborative editing with fickle operations

... The table (Table-1) shows that the arrival time and the update time of the six replicas. The graph has been plotted according to the nano second values. All the replicas can arrive in the different time slots and make ...

8

A Survey and Comparative Analysis on Video Watermarking

A Survey and Comparative Analysis on Video Watermarking

... These attacks can be generally classified as non-malicious (unintentional) such as compression of a legally attained watermark image or video file and malicious (intentional) such as an attempt by a ...

7

An approach for defending against collaborative attacks by malicious nodes in MANETs

An approach for defending against collaborative attacks by malicious nodes in MANETs

... detecting malicious nodes launching grayhole or collaborative blackhole attacks is a ...of malicious-node attacks, the CBDS outperforms the DSR, 2ACK, and best-effort fault-tolerant routing ...

9

Prevention of Collaborative Attacks of Malicious Node in MANET Using CBDA Scheme

Prevention of Collaborative Attacks of Malicious Node in MANET Using CBDA Scheme

... the malicious nodes that attempt to launch grayhole/collaborative blackhole ...bait malicious nodes to send a reply RREP message, and malicious nodes are detected using a reverse tracing ...detected ...

6

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE

... images as passwords. Human brain is good in remembering picture than textual character. Password guessing resistant protocol is used which provides protection against keyloggers and spyware. The advantage is that for ...

6

Attack data analysis to find Cross Site 
		Scripting attack patterns

Attack data analysis to find Cross Site Scripting attack patterns

... Scripting attacks. Compared to normal websites more XSS attacks happening on government and educational websites so these sites maintainers need to follow proper security ...

8

Show all 4350 documents...

Related subjects