• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11
Next 10 →

Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation

by Lanjia Wang, Zhichun Li, Yan Chen, Zhi (judy Fu, Xing Li
"... Abstract—It is crucial to detect zero-day polymorphic worms and to generate signatures at network gateways or honeynets so that we can prevent worms from propagating at their early phase. However, most existing network-based signatures are specific to exploit and can be easily evaded. In this paper, ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
, we propose generating vulnerability-driven signatures at network level without any host-level analysis of worm execution or vulnerable programs. As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities1

Session 5: Secure Networks Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits

by Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier
"... Software patching has not been effective as a first-line defense against large-scale worm attacks, even when patches have long been available for their corresponding vulnerabilities. Generally, people have been reluctant to patch their systems immediately, because patches are perceived to be unrelia ..."
Abstract - Add to MetaCart
of the vulnerable application. The expressiveness of the language has been verified by encoding the signatures of several known vulnerabilites. Our evaluation provides evidence of Shield’s low false positive rate and small impact on application throughput. An examination of a sample set of known vulnerabilities

FEATURE ARTICLE The Cortical Signature of Alzheimer’s Disease: Regionally Specific Cortical Thinning Relates to Symptom Severity in Very Mild to Mild AD Dementia and is Detectable in Asymptomatic Amyloid- Positive Individuals

by Bradford C. Dickerson, Akram Bakkour, David H. Salat, Eric Feczko, Fran Grodstein, Christopher I. Wright, Deborah Blacker, H. Diana Rosas, Reisa A. Sperling, Alireza Atri, H. Growdon Bradley T. Hyman, Bruce Fischl, Y L. Buckner , 2008
"... Alzheimer’s disease (AD) is associated with neurodegeneration in vulnerable limbic and heteromodal regions of the cerebral cortex, detectable in vivo using magnetic resonance imaging. It is not clear whether abnormalities of cortical anatomy in AD can be reliably measured across different subject sa ..."
Abstract - Add to MetaCart
in vivo signature of abnormal cortical anatomy in AD, which parallels known regional vulner-ability to AD neuropathology. Thinning in vulnerable cortical regions relates to symptom severity even in the earliest stages of clinical symptoms. Furthermore, subtle thinning is present in

1On the Detection of Signaling DoS Attacks on 3G Wireless Networks

by Patrick P. C. Lee, Tian Bu, Thomas Woo
"... Abstract — Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling and relatively limited bandwidth, these 3G networks are generally more vulnerable than their wireline counterparts, ..."
Abstract - Add to MetaCart
, thus making them fertile ground for new attacks. In this paper, we identify and study a novel Denial of Service (DoS) attack, called signaling attack, that exploits the unique vulnerabilities of the signaling/control plane in 3G wireless networks. Using simulations driven by real traces, we are able

On the Detection of Signaling DoS Attacks on 3G/WiMax Wireless Networks

by Patrick P. C. Leea, Tian Bub, Thomas Woob
"... Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling and relatively limited bandwidth, these 3G networks are generally more vulnerable than their wireline counterparts, thus makin ..."
Abstract - Add to MetaCart
making them fer-tile ground for new attacks. In this paper, we identify and study a novel Denial of Service (DoS) attack, called signaling attack, that exploits the unique vulnera-bilities of the signaling/control plane in 3G wireless networks. Using simulations driven by real traces, we are able

An Automatic Detection System for SQL Injection

by Divya Jain, Naveen Choudhary
"... The growth of the internet is increasing day by day, mostly content is database driven. There are many web applications like E-Commerce, banking where he/she has to trust on this application and have to provide personal information into their underlying database. If there is no confidentiality and s ..."
Abstract - Add to MetaCart
information or may destroy the database. In this paper, proposing a technique to detect SQL injection using the hidden web crawling technique incorporating with parse tree and digital signature. The proposed scheme finds a SQL injection vulnerability by replicating web attack and analyze the data

doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine

by Zhongqiang Chen, Yuan Zhang, Zhongrong Chen, Alex Delis , 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract - Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real

unknown title

by unknown authors
"... ABSTRACT: Digital security has turn out to be high need in Industrial Automation (IA).Here reliable operation is to guarantee the safe, steady and dependable in power network delivery. Lack of clarity advancement can be effectively uprooted by utilizing the IDS system. Access control procedure is b ..."
Abstract - Add to MetaCart
of cybersecurity vulnerabilities. Furthermore, SCADA systems with legacy devices lack inbuilt cybersecurity consideration, which has resulted in serious cybersecurity vulnerable points. In practice, unauthorized or malicious access from outside sources, using Internet protocol driven proprietary or local

Magnet: Robust and Efficient Collection through Control and Data Plane Integration

by unknown authors
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract - Add to MetaCart
Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause existing collection protocols to have poor reliability and waste energy: inaccuracies in link estimation, link dynamics, and transient loops. In this paper we present Magnet, a robust, efficient, and hardware-independent collection protocol. Magnet uses three novel techniques to address these challenges. Magnet’s link estimator addresses the inaccuracies in link estimation by using feedback from both the data and control planes, using information from multiple layers through narrow, platform-independent interfaces. Second, Magnet addresses link dynamics by using the Trickle algorithm for control traffic, sending few beacons in stable topologies yet quickly adapting to changes. Finally, Magnet addresses transient loops by using data traffic as active topology probes, quickly discovering and fixing routing failures. Magnet runs on six different mote platforms and we have tested it on four testbeds. In most experiments, Magnet achieves 99 % reliability, and in some cases 99.9%. In the most challenging testbed, the state-of-the-art collection protocol today (MultiHopLQI) achieves 70 % reliability: Magnet achieves 97%. Magnet achieves this ten-fold reduction in dropped packets with 25 % fewer transmissions. Magnet works seamlessly on top of existing low-power MAC layers. Together, these results suggest that Magnet can be the robust, efficient collection layer that so many sensor network applications and protocols need. 1

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are client-server based, which is feasible for relatively slow role-playing games. Those have modest bandwidth and latency requirements and are paid for by their customers. For MMOGs with higher realtime requirements and/or a smaller number of customers willing to pay, peer-to-peer networking seems to be a serious alternative. This work analyzes the implementation of both a client-server and a peer-to-peer networking model for the prototype shooter game Planet π4. Initially, a survey introduces recent academic approaches to peer-to-peer systems specifically designed for games. Of those, one system is selected for implementation with Planet π4. Planet π4 is improved in several aspects for the purpose of analyzing various network implementations. First, its architecture is restructured and cleaned to allow for an easy replacement of the networking component. Second, its core is modified to work in a completely event-based mode, supporting the execution of the game in an discrete-event-based network simulator. Third, a simple artificial intelligence player is developed for workload generation in large (and possibly simulated) networks. Furthermore, the newly developed transport protocol CUSP is applied for the network implementation, thus the game is the first real application using CUSP. Finally the game Planet π4 is integrated with the CUSP network simulator, allowing to run the whole game in a simulated network without the need for modification of its core components. Kurzfassung Massen-Mehrspieler-Onlinespiele (Massively multiplayer online games; MMOGs) wurden in den vergangenen Jahren zunehmend populär, insbesondere in Form von Online-Rollenspielen (MMORPGs). In
Next 10 →
Results 1 - 10 of 11
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University