Results 1 -
6 of
6
Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks
"... The paper outlines a bioinspired approach named "network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed prosedures of information collection and p ..."
Abstract
- Add to MetaCart
(Show Context)
The paper outlines a bioinspired approach named "network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed prosedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine nessesary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described.
Framework for Creating Realistic Port Scanning Benchmarks
"... Abstract- Port scanning is one of the most popular reconnaissance techniques that many attackers use to profile running services on a potential target before launching an attack. Many port scanning detection mechanisms have been suggested in literature. However, very little work has been done on gen ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract- Port scanning is one of the most popular reconnaissance techniques that many attackers use to profile running services on a potential target before launching an attack. Many port scanning detection mechanisms have been suggested in literature. However, very little work has been done on generating port scanning benchmarks that researchers can use to test their detection methods. In this paper, we suggest a simulation framework using OMNeT++ to generate benchmarks that resemble real-life traffic. We approach the problem by dividing it into three modules (topology creation, good traffic generation, bad traffic generation), each of which we make realistic, similar to deployed and usable networks. Hence the resultant benchmark is annotated and made public.
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. (2011) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/wcm.1093 RESEARCH ARTICLE Sequential frequency reuse with power control for
"... Orthogonal frequency division multiple access (OFDMA) is a promising technique for high data rate communications in future cellular systems. Since frequency resources are universally reused in every cell in a system, a typical OFDMA system tries to maximize the spectral efficiency. Users located nea ..."
Abstract
- Add to MetaCart
(Show Context)
Orthogonal frequency division multiple access (OFDMA) is a promising technique for high data rate communications in future cellular systems. Since frequency resources are universally reused in every cell in a system, a typical OFDMA system tries to maximize the spectral efficiency. Users located near the cell-edge tend to have the weakest signal strength. So they might experience severe inter-cell interferences (ICIs). In this paper, we propose a sequential frequency reuse (SqFR) that reduces ICIs by a sequential sub-channel allocation. By giving more power to sub-carriers allocated to cell-edge users, our SqFR significantly enhances the performance of cell-edge users. The performance of the proposed SqFR is investigated via the analysis and simulations. Simulation results show that proposed SqFR improves the performance of cell-edge users in
Load Balancing
"... 1 The WLANs for the past few years have become very popular. Their advantages come in various forms, but the most valuable advantage is the fact that one doesn't need any more wires to connect to the Internet. More over, a number of stations can connect to the access point, wilst in the past th ..."
Abstract
- Add to MetaCart
1 The WLANs for the past few years have become very popular. Their advantages come in various forms, but the most valuable advantage is the fact that one doesn't need any more wires to connect to the Internet. More over, a number of stations can connect to the access point, wilst in the past the only
Telecommunication Systems manuscript No. (will be inserted by the editor) On the Resistance of Overlay Networks against Bandwidth Exhaustion Attacks
"... Abstract In order to perform private communication over public networks, such as the Internet, several dif-ferent kinds of virtual overlay networks emerged. Ex-amples are the well known Virtual Private Networks (VPN), Darknets, and anonymizing networks like Tor. All of these networks are designed to ..."
Abstract
- Add to MetaCart
Abstract In order to perform private communication over public networks, such as the Internet, several dif-ferent kinds of virtual overlay networks emerged. Ex-amples are the well known Virtual Private Networks (VPN), Darknets, and anonymizing networks like Tor. All of these networks are designed to provide data de-livery that is confidential, authentic and integrity pro-tected. Nonetheless, for a secure operation also the avail-ability must be taken into account, especially as these structures turn into vital targets for Denial-of-Service (DoS) attacks. Within this article we present metrics to rate differ-ent network topologies with regard to their resistance against botnets, whose available attack bandwidth is not a limiting factor. The presented metrics consider random, greedy, and optimally operating attackers, and are used to derive several properties that very resilient overlay topologies must have. In particular high girth and a low constant node degree were identified and val-idated by simulations.
Summary
"... networking: framework, mechanisms, and experimental evaluation Deliverable number 1.5a Deliverable name First interim strategy document for re-silient networking WP number 1 ..."
Abstract
- Add to MetaCart
(Show Context)
networking: framework, mechanisms, and experimental evaluation Deliverable number 1.5a Deliverable name First interim strategy document for re-silient networking WP number 1