network attack research papers 2014
Network attack detection and defense: securing industrial control systems for critical infrastructures (Dagstuhl Seminar 14292)
free download
Abstract This report documents the program and the outcomes of Dagstuhl Seminar 14292 Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures . The main objective of the seminar was to discuss new approaches and
A New Factor State Space Model for SCADA Network Attack and Defense
free download
Abstract To solve the security problem in the supervisor control and data acquisition (SCADA), a new factor network model of SCADA network attack and defense based on factor state space is presented. Combining with factor space theory, formal descriptions of
A model towards using evidence from security events for network attack analysis
free download
ABSTRACT Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use the information obtained from security events to construct an attack scenario and build an
Study on The network attack model
free download
Abstract. In the paper, a global network attack model based on Hierarchical Expanded Stochastic Petri Net (HESPN) is presented. The model is suitable for the cooperative attack simulation and can describe both macroscopic network attack and microcosmic host
The Network Attack Model based on Hierarchical Expanded Stochastic Petri Net
free download
Abstract In the paper, a global network attack model based on Hierarchical Expanded Stochastic Petri Net (HESPN) is presented. The model is suitable for the cooperative attack simulation and can describe both macroscopic network attack and microcosmic host
Game-based Analysis of the Network Attack-Defense Interaction
free download
ABSTRACT The interactive behavior between the attacker and the defender in a network environment is similar to information warfare where both attacker and defender may have several available strategies to achieve maximum gratification. The process of positioning
Optimized and Executive Survey of Physical Node Capture Attack in Wireless SensorNetwork
free download
ABSTRACT Wireless sensor networks (WSNs) are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These
Analysis for Ad Hoc Network Attack-Defense Based on Stochastic Game Model
free download
ABSTRACT The attack actions analysis for Ad Hoc networks can provide a reference for the design security mechanisms. This paper presents an analysis method of security of Ad Hoc networks based on Stochastic Game Nets (SGN). This method can establish a SGN model
SIMULATION OF BLACK HOLE ATTACK IN ADHOC NETWORK USING NS2
free download
ABSTRACT Ad hoc networks have a dynamic topology such that nodes can easily join or leave the network at any time. Ad hoc Networks exposed to different attacks due to its characteristic like dynamic topology open medium, no central authority and no clear
SYBILSECURE: AN ENERGY EFFICIENT SYBIL ATTACK DETECTION TECHNIQUE IN WIRELESS SENSOR NETWORK
free download
ABSTRACT A wireless sensor network consists of many sensor nodes which are deployed to monitor physical or environmental conditions and to pass the collected data to a base station. Though wireless sensor network is subjected to have major applications in all the
Intelligent Network Surveillance Technology for APT Attack Detections
free download
ABSTRACT Recently, long-term, advanced cyber-attacks targeting a specific enterprise or organization have been occurring again. These attacks occur over a long period and bypass detection by security systems unlike the existing attack pattern. For such reason, they Reliability, flexibility, security and efficiency of energy transmission and distribution will be provided with a new type of power grid called Smart Grid. In order to achieve the smart grid goals, the information technology (IT) and computer infrastructures based automation
Detection and Prevention of Wormhole Attack in Spontaneous Wireless Network
free download
ABSTRACT Wormhole Attacks in ad-hoc networks can be to a great degree troublesome in specific circumstances particularly when they prompt Rushing Attacks. Our proposed arrangement in" Wormhole Attack Prevention in MANETs utilizing Secured Clustering as a
BHDP Using Fuzzy Logic Algorithm for Wireless Sensor Network under Black Hole Attack
free download
ABSTRACT Wireless sensor networks are popular to today, the security in wireless sensor networks (WSNs) is a main issue due to the naturally limitations of computational capacity and power usage. The Black Hole attack is one of the main attacks that challenge the
Evaluation for Alive Node on Wireless Sensor Network Denial of Sleep Attack
free download
ABSTRACT Wireless sensor networks (WSNs) have gained worldwide attention in recent years. Wireless sensor network consists o many nodes. Battery is the main power source in a sensor node. Usually, some nodes act maliciously and they are able to do different kinds
The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing
free download
Abstract Mobile Ad Hoc Network (MANET) is a temporary network of mobile nodes where mobile nodes communicate with each other through wireless links with no fixed infrastructure and no centralized control. Each mobile node in such a scenario acts as
A Statistical Communication Analysis Model for Attack Detection in Mobile Network
free download
ABSTRACT Security is one of the most critical issue of mobile network that ensures the reliable communication over the network. Because of dynamic property of Mobile Adhoc Network, the chances of the security issues increases. These attacks are incorporated at
A Review of Cyber Attack Classification Technique Based on Data Mining and NeuralNetwork Approach
free download
Abstract Cyber attack detection and classification is major challenge for web and network security. The increasing data traffic in network and web invites multiple cyber attack. The dynamic nature and large number of attribute of cyber data faced a problem of detection
Analysis of Dead Node in Wireless Sensor Network Denial of Sleep Attack
free download
ABSTRACT With the progression of computer networks extending boundaries and joining distinct locations, wireless sensor networks (WSN) comes as a new frontier in developing opportunities to collect and process data from remote locations. Usually, some nodes act
An Unobservable Secure Routing Protocol with Wormhole Attack Prevention for Mobile Ad-Hoc Network
free download
ABSTRACT Privacy preserving routing is crucial in Mobile ad-hoc network for this require stronger privacy protection. An unobservable secure routing protocol with wormhole attack prevention provides anonymity, content unobservabilitywormhole attack prevention in
Optimal Control Model for Attack of Worms in Wireless Sensor Network.
free download
ABSTRACT Wireless Sensor Network (WSN) is composed of large number of sensor nodes which communicate with each other through wireless medium. Such networks are prone to the attack of self-replicating worms known as malware used to bring different form of
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK IN PRESENCE OF GRAYHOLE ATTACK
free download
ABSTRACT The tremendous growth in wireless communication and digital electronics has led to the development of low-cost and low-power sensor nodes that are small in size and may communicate over short distances. Sensor nodes are deployed in hostile
An Approach for Prevention of MitM Attack Based on Rogue AP in Wireless Network.
free download
ABSTRACT With the rapid development of WLAN, more and more schools and businesses have begun to provide the WLAN for users. However, WLAN is considerably more susceptible to MitM (man-in-the-middle) attack. To overcome it, we propose a dynamic
Mobile-id Based Sybil Attack detection on the Mobile ADHOC Network
free download
ABSTRACT Mobility is often a problem for providing security services in ad hoc networks. Mobility can be used to enhance security. An advantage of such a network is that no fixed infrastructure is required. In the Sybil attack a single node presents multiple fake identities
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing
free download
ABSTRACT The paper is devoted to the security assessment problem. Authors suggest an approach to the security assessment based on the attack graphs that can be implemented in contemporary Security Information and Event Management (SIEM) systems. Key feature of
Anonymous On-demand Routing Protocol for Secure Data Transmission against Wormholeattack in Vehicular Adhoc Network
free download
ABSTRACT VANETs is a technology that provides communication between moving vehicles. VANETs are highly dynamic in nature due to mobility of vehicles. This dynamic nature causes topological change in the network, which may affect the communication and
Comparison of ICM with TPF-LEP to Prevent MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network
free download
ABSTRACT A Comparison of Integrated Central Manager (ICM) and Traffic Pattern Filtering with Letter Envelop Protocol (TPF-LEP) is done. Denial of Service (DoS) attack is a biggest peril in wireless local area infrastructure network. It makes the resources unavailable for
Privacy Preservation of Social Network Data against Structural Attack using K-Auto restructure
free download
ABSTRACT Recent few years social networking sites are facing a problem of various attacks on their network which contains sensitive data. Usually social networks will publish their social network data for research purpose. Researchers and social network analysts can
Light Weight Security Attack in Mobile Ad Hoc Network (MANET)
free download
ABSTRACT Mobile ad hoc network (MANET) is a collection of mobile nodes that communicate with each other without any fixed infrastructure or a central network authority. From a security design perspective, MANETs have no clear line of defense; ie no built-in security. Thus,
Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network
free download
ABSTRACT Diagnosis of diseases is an important and intricate job in medicine. The identification of heart disease from diverse features is a no of layered problem that is not free from the wrong assumptions and is frequently accompanied by impulsive effects. Thus to
A FEED FORWARD ARTIFICIAL NEURAL NETWORK BASED SYSTEM TO MINIMIZE DOSATTACK IN WIRELESS NETWORK.
free download
ABSTRACT Security has become more and more important in our life according to development. During the past years, the concepts of security involved considering the process of assessing computer system, network and file, scanning, analyzing system
Wormhole Attack in Wireless Sensor Network
free download
ABSTRACT In multi hop wireless systems, such as wireless sensor networks, mobile ad hoc network, security is an important factor. It becomes more critical issue when we transmit important data between nodes. There are a lot of attacks available in wireless sensor
Detection of Grouped Malicious Nodes to Avoid Black Hole Attack in Mobile Ad-Hoc Network
free download
T Nandhini, V Sandhya, R Kundhavai International Journal for Scientific 2015 ijirst.org ABSTRACT A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols,
POSTER: Network-based Advanced Persistent Threat Attack Detection
free download
ABSTRACT For years businesses have striven to keep malware, spam and unwanted intruders at bay with varying degrees of success. Cyber criminals and spies in turn created more advanced means to breach the security measures. An APT is a form of multistep
Sanitization Techniques against Personal Information Inference Attack on Social Network
free download
ABSTRACT Online social networking has become one of the most popular activities on the web. Online social networks such as Facebook are increasingly utilized by many people. OSNs allow users to control and customize what personal information is available to other users.
Preserving Flood Attack on Delay Tolerant Network
free download
ABSTRACT Disruption Tolerant Networks utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood attacks in
Spoofing Attack Detection and Localization in Adhoc network using Received Signal Strength (RSS)
free download
ABSTRACT A wireless ad hoc network is formed by a collection of nodes, with no preset infrastructure where each node plays a role of router, It is recognition day by day due to wide use of mobile and handheld devices. Due to dynamic nature of this network, Device
Black-box attack on network intrusion detection systems
free download
Abstract/Abstrakt Network security can be viewed as a long lasting arms race between adversaries and intrusion detection systems designers, each of them trying to reach their goals by reacting to the oponent's actions. A potential breakthrough in this race could be
-SOFTWARE SALES SERVICE-https://www.engpaper.net--