Siga este enlace para ver otros tipos de publicaciones sobre el tema: Attack Path.

Artículos de revistas sobre el tema "Attack Path"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Attack Path".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.

Texto completo
Resumen
As the cloud infrastructure is simultaneously shared by millions of consumers, heinous use of cloud resources are also increasing. It makes ways to attackers to set up attacks by exploiting the vulnerabilities. And obviously, these attacks are leading to severe disasters as innocent consumers are unknowingly sharing cloud resources with harmful attackers. To prevent the occurrence of cloud attacks, attack graph based framework is proposed in this paper. Here, an attack path sketches an attack scenario by a streak of threats ranging in severity rating that shows how popular a particular cloud n
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Li, Erxia, Chaoqun Kang, Deyu Huang, et al. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees." Information 10, no. 8 (2019): 251. http://dx.doi.org/10.3390/info10080251.

Texto completo
Resumen
This study focuses on the problem of attack quantification in distribution automation systems (DASs) and proposes a quantitative model of attacks based on the common vulnerability scoring system (CVSS) and attack trees (ATs) to conduct a quantitative and systematic evaluation of attacks on a DAS. In the DAS security architecture, AT nodes are traversed and used to represent the attack path. The CVSS is used to quantify the attack sequence, which is the leaf node in an AT. This paper proposes a method to calculate each attack path probability and find the maximum attack path probability in DASs
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Huang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 3 (2023): 1–30. http://dx.doi.org/10.1145/3626789.

Texto completo
Resumen
While softwarization and virtualization technologies make modern communication networks appear easier to manage, they also introduce highly complex interactions within the networks that can cause unexpected security threats. In this work, we study a particular security threat due to the sharing of links between high-security paths and low-security paths, which enables a new type of DoS attacks, called cross-path attacks, that indirectly attack a set of targeted high-security paths (target paths) by congesting the shared links through a set of attacker-controlled low-security paths (attack path
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Huang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.

Texto completo
Resumen
While softwarization and virtualization technologies make modern communication networks appear easier to manage, they also introduce highly complex interactions within the networks that can cause unexpected security threats. In this work, we study a particular security threat due to the sharing of links between high-security paths and low-security paths, which enables a new type of DoS attacks, called cross-path attacks, that indirectly attack a set of targeted high-security paths (target paths) by congesting the shared links through a set of attacker-controlled low-security paths (attack path
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Li, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu, and Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm." Mathematics 10, no. 21 (2022): 3938. http://dx.doi.org/10.3390/math10213938.

Texto completo
Resumen
Industrial control systems (ICS) are facing an increasing number of sophisticated and damaging multi-step attacks. The complexity of multi-step attacks makes it difficult for security protection personnel to effectively determine the target attack path. In addition, most of the current protection models responding to multi-step attacks have not deeply studied the protection strategy selection method in the case of limited budget. Aiming at the above problems, we propose a protection strategy selection model based on the Genetic Ant Colony Optimization Algorithm. The model firstly evaluates the
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Levner, Eugene, and Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes." Algorithms 17, no. 11 (2024): 504. http://dx.doi.org/10.3390/a17110504.

Texto completo
Resumen
This paper studies the security issues for cyber–physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the most vulnerable attack path in a known attack graph, where an attack path is a sequence of steps that an attacker can take to compromise the underlying network. Determining an attacker’s possible attack path is critical to cyber defenders as it helps identify threats, harden the network, and thwart attacker’s intentions. We formulate this problem as a path-finding optimization problem with logical constraints repres
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Bhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.

Texto completo
Resumen
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficul
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Guo, Wei, Zhi Zhang, Liyuan Chang, Yue Song, and Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid." Drones 8, no. 9 (2024): 437. http://dx.doi.org/10.3390/drones8090437.

Texto completo
Resumen
As IoT technology advances, the smart grid (SG) has become crucial to industrial infrastructure. However, SG faces security challenges, particularly from distributed denial of service (DDoS) attacks, due to inadequate security mechanisms for IoT devices. Moreover, the extensive deployment of SG exposes communication links to attacks, potentially disrupting communications and power supply. Link flooding attacks (LFAs) targeting congested backbone links have increasingly become a focal point of DDoS attacks. To address LFAs, we propose integrating unmanned aerial vehicles (UAVs) into the Smart G
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Bhavani, Yerram, Vinjamuri Janaki, and Rangu Sridevi. "IP Traceback using Flow Based Classification." Recent Advances in Computer Science and Communications 13, no. 3 (2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.

Texto completo
Resumen
Background:Distributed Denial of Service (DDoS) attack is a major threat over the internet. The IP traceback mechanism defends against DDoS attacks by tracing the path traversed by attack packets. The existing traceback techniques proposed till now are found with few short comings. The victim required many number of packets to trace the attack path. The requirement of a large number of packets resulted in more number of combinations and more false positives.Methods:To generate a unique value for the IP address of the routers in the attack path Chinese Remainder theorem is applied. This helped
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Hu, Jian, Zhenhong Zhang, Feilu Hang, and Linjiang Xie. "Design of 0-day Vulnerability Monitoring and Defense Architecture based on Artificial Intelligence Technology." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3491–99. http://dx.doi.org/10.12694/scpe.v25i5.3035.

Texto completo
Resumen
In response to the difficulty in detecting attacks caused by the unknown nature of 0-day vulnerabilities, the author proposes a knowledge graph based 0-day attack path prediction method. By extracting concepts and entities related to attacks from existing research on the ontology of network security and network security databases, a network defense knowledge graph is constructed to extract discrete security data such as threats, vulnerabilities, and assets into interrelated security knowledge. Using a knowledge graph reasoning method based on path sorting algorithm to explore possible 0-day at
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Al-Araji, Zaid J., Sharifah Sakinah Syed Ahmad, and Raihana Syahirah Abdullah. "Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph." Karbala International Journal of Modern Science 8, no. 3 (2022): 313–29. http://dx.doi.org/10.33640/2405-609x.3235.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Abujassar, Radwan, Mohamed Sayed, and Husam Yaseen. "A new algorithm to enhance security against cyber threats for internet of things application." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4452. http://dx.doi.org/10.11591/ijece.v13i4.pp4452-4466.

Texto completo
Resumen
<p>One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper,
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Radwan, S. Abujassar, Sayed Mohamed, and Yaseen Husam. "A new algorithm to enhance security against cyber threats for internet of things application." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4452–66. https://doi.org/10.11591/ijece.v13i4.pp4452-4466.

Texto completo
Resumen
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Wu, Runze, Jinxin Gong, Weiyue Tong, and Bing Fan. "Network Attack Path Selection and Evaluation Based on Q-Learning." Applied Sciences 11, no. 1 (2020): 285. http://dx.doi.org/10.3390/app11010285.

Texto completo
Resumen
As the coupling relationship between information systems and physical power grids is getting closer, various types of cyber attacks have increased the operational risks of a power cyber-physical System (CPS). In order to effectively evaluate this risk, this paper proposed a method of cross-domain propagation analysis of a power CPS risk based on reinforcement learning. First, the Fuzzy Petri Net (FPN) was used to establish an attack model, and Q-Learning was improved through FPN. The attack gain was defined from the attacker’s point of view to obtain the best attack path. On this basis, a quan
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

V, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.

Texto completo
Resumen
In this research paper, we discussed the guaranteed reliable communication between nodes by constructing the black hole attack free route in MANET. To achieve this, a Hybrid Intrusion Detection System (HIDS) technique has been proposed to detect and remove the black hole attack nodes in the routing path. In MANETs, a novel cluster leader election process has been proposed. This election process is based on the node with maximum energy level. One of the important functionality is security in MANET. Due to many different attacks in the routing path, MANET becomes unsecure. Understanding the form
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

AlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, and Ahmed Shdefat. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks." Sensors 23, no. 1 (2022): 102. http://dx.doi.org/10.3390/s23010102.

Texto completo
Resumen
In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a significant amount of traffic to flood the victim or the network infrastructure. In this paper, a common type of DDoS attacks known as “TCP SYN-Flood” is studied. This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

International, Journal on AdHoc Networking Systems (IJANS). "Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc Networks." International Journal on AdHoc Networking Systems (IJANS) 2, no. 4 (2024): 77–87. https://doi.org/10.5121/ijans.2012.2408.

Texto completo
Resumen
Mobile Adhoc Networks is a wireless network and it has become an important technology in current yearsin which security has become an important problem. Black hole Attack is one of the promising and severesecurity attacks in mobile ad hoc networks which block the communication of secret data during packetdelivery. Black hole attack directly attacks the node’s data traffic on the path and with intent drops, altersor delays the data traffic passing through that node. In other type of black hole attack which misleadinglyreplies for the route request which comes from the node which initiates
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Upendra, Kumar Purohit, Barahdiya Umesh, and Jakhenia Manoj. "DETECTION MECHANISM OF WORMHOLE ATTACK USING ON DEMAND ROUTING SCHEME IN WIRELESS ENVIRONMENT." International Journal of Engineering Research and Modern Education 2, no. 1 (2017): 48–52. https://doi.org/10.5281/zenodo.400746.

Texto completo
Resumen
Security is the one of the major issue that exists in Mobile Ad hoc network. Mobile Ad hoc network is infrastructure less network so it is vulnerable to several security attacks that are on different layers. Wormhole attack is one of the serious routing attack on network layer. This paper focuses on the wormhole attack. The application of multi-path techniques in wireless ad hoc networks is natural, as multi-path routing (MR) allows diminishing the effect of unreliable wireless links and the constantly changing network topology. In this paper we have used multipath scheme for detection and pre
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

An, Hyok, Yoonjong Na, Heejo Lee, and Adrian Perrig. "Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures." Electronics 10, no. 11 (2021): 1240. http://dx.doi.org/10.3390/electronics10111240.

Texto completo
Resumen
The current state of security and availability of the Internet is far from being commensurate with its importance. The number and strength of DDoS attacks conducted at the network layer have been steadily increasing. However, the single path (SP) routing used in today’s Internet lacks a mitigation scheme to rapidly recover from network attacks or link failure. In case of a link failure occurs, it can take several minutes until failover. In contrast, multi-path routing can take advantage of multiple alternative paths and rapidly switch to another working path. According to the level of availabl
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Ren, Yuchen, Zhengyu Zhao, Chenhao Lin, et al. "Improving Integrated Gradient-based Transferable Adversarial Examples by Refining the Integration Path." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 7 (2025): 6731–39. https://doi.org/10.1609/aaai.v39i7.32722.

Texto completo
Resumen
Transferable adversarial examples are known to cause threats in practical, black-box attack scenarios. A notable approach to improving transferability is using integrated gradients (IG), originally developed for model interpretability. In this paper, we find that existing IG-based attacks have limited transferability due to their naive adoption of IG in model interpretability. To address this limitation, we focus on the IG integration path and refine it in three aspects: multiplicity, monotonicity, and diversity, supported by theoretical analyses. We propose the Multiple Monotonic Diversified
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Koo, Kijong, Daesung Moon, Jun-Ho Huh, Se-Hoon Jung, and Hansung Lee. "Attack Graph Generation with Machine Learning for Network Security." Electronics 11, no. 9 (2022): 1332. http://dx.doi.org/10.3390/electronics11091332.

Texto completo
Resumen
Recently, with the discovery of various security threats, diversification of hacking attacks, and changes in the network environment such as the Internet of Things, security threats on the network are increasing. Attack graph is being actively studied to cope with the recent increase in cyber threats. However, the conventional attack graph generation method is costly and time-consuming. In this paper, we propose a cheap and simple method for generating the attack graph. The proposed approach consists of learning and generating stages. First, it learns how to generate an attack path from the at
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Qiu, Shenjian, Zhipeng Shao, Jian Wang, Shiyou Xu, and Jiaxuan Fei. "Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge." Applied Sciences 14, no. 14 (2024): 6189. http://dx.doi.org/10.3390/app14146189.

Texto completo
Resumen
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced. We are facing cyber-physical cross-domain attacks with the characteristics of strong targeting, high concealment, and cross-space threats. This paper proposes a quantitative analysis method for the influence of power cyber-physical cross-domain attack paths based on graph knowledge. First, a layered attack graph was constructed based on the cro
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Panda, Niranjan, and Binod Kumar Pattanayak. "Defense Against Co-Operative Black-hole Attack and Gray-hole Attack in MANET." International Journal of Engineering & Technology 7, no. 3.4 (2018): 84. http://dx.doi.org/10.14419/ijet.v7i3.4.16752.

Texto completo
Resumen
Mobile Ad-hoc networks (MANETs) can be termed as an autonomous system created by the collaboration of a set of motile nodes communicating with one another through available wireless media and each node behaves as an end system, as well as a router for packet forwarding. Each node is allowed to move freely, change locations and configure them to form a network. Finding an optimal and efficient path between the sender and receiver node is the main aim of routing protocols. Multipath routing protocols show a better result in comparison to single path routing protocols, for data transmission from
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Dr, V.C Kotak*1 &. Nivedeeta Banerjee2. "CRYPTOGRAPHIC APPROACH TO ELIMINATE BLACK HOLE ATTACK IN MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 8 (2017): 344–47. https://doi.org/10.5281/zenodo.845302.

Texto completo
Resumen
In Manets, nodes usually cooperate and forward each other packets. But in hostile environment some nodes may intentionally misbehave or would not forward disrupting from communication. One of the attacks is black hole attack. The black hole attack intentionally drops the packet or jeopardize. Black hole node claims to have shortest path and participate in communication. The proposed system uses AODV encryption and decryption to prevent black hole attack .it is simulated using NS 2.34.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Hsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (2021): 12514. http://dx.doi.org/10.3390/su132212514.

Texto completo
Resumen
The DDoS attack is one of the most notorious attacks, and the severe impact of the DDoS attack on GitHub in 2018 raises the importance of designing effective defense methods for detecting this type of attack. Unlike the traditional network architecture that takes too long to cope with DDoS attacks, we focus on link-flooding attacks that do not directly attack the target. An effective defense mechanism is crucial since as long as a link-flooding attack is undetected, it will cause problems over the Internet. With the flexibility of software-defined networking, we design a novel framework and im
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Kasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "Predicting Attack Paths from Application Security Vulnerabilities Using a Multi-Layer Perceptron." American Journal of Software Engineering and Applications 12, no. 1 (2024): 23–35. http://dx.doi.org/10.11648/j.ajsea.20241201.14.

Texto completo
Resumen
This paper is in the series of continuing research and proposes an approach to predicting possible attack paths from application security vulnerability-based attack trees. The attack trees are formed by stringing together weaknesses discovered in an application code and a group of applications within a domain. The Common Weakness Enumeration (CWE) and Common Vulnerabilities and Exposures (CVE) linked together as a string of vulnerabilities in the attack trees can be visualized as pathways for attacks. These pathways become potential attacks that can spread vertically and horizontally leading t
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Zhang, Shuqin, Peiyu Shi, Tianhui Du, Xinyu Su, and Yunfei Han. "Threat Attribution and Reasoning for Industrial Control System Asset." International Journal of Ambient Computing and Intelligence 15, no. 1 (2023): 1–27. http://dx.doi.org/10.4018/ijaci.333853.

Texto completo
Resumen
Due to the widespread use of the industrial internet of things, the industrial control system has steadily transformed into an intelligent and informational one. To increase the industrial control system's security, based on industrial control system assets, this paper provides a method of threat modeling, attributing, and reasoning. First, this method characterizes the asset threat of an industrial control system by constructing an asset security ontology based on the asset structure. Second, this approach makes use of machine learning to identify assets and attribute the attacker's attack pa
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Wan, Gerry, Aaron Johnson, Ryan Wails, Sameer Wagh, and Prateek Mittal. "Guard Placement Attacks on Path Selection Algorithms for Tor." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (2019): 272–91. http://dx.doi.org/10.2478/popets-2019-0069.

Texto completo
Resumen
Abstract The popularity of Tor has made it an attractive target for a variety of deanonymization and fingerprinting attacks. Location-based path selection algorithms have been proposed as a countermeasure to defend against such attacks. However, adversaries can exploit the location-awareness of these algorithms by strategically placing relays in locations that increase their chances of being selected as a client’s guard. Being chosen as a guard facilitates website fingerprinting and traffic correlation attacks over extended time periods. In this work, we rigorously define and analyze the guard
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Liao, Yan. "Enhancing Industrial Control Network Security Through Vulnerability Detection and Attack Graph Analysis." Scalable Computing: Practice and Experience 25, no. 1 (2024): 65–74. http://dx.doi.org/10.12694/scpe.v25i1.2254.

Texto completo
Resumen
Insufficient communication attack defense capabilities within industrial control networks is a serious problem that is addressed in this study. The author proposes a methodology that focuses on creating attack graphs to ease security and vulnerability studies in industrial control network systems in order to address this issue. The article provides thorough construction guidance and techniques for attack graphs, which are used for penetration testing and vulnerability analysis of networks for industrial control systems. On the created attack graph, experimental evaluations utilizing the ``eart
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

He, Jiaji, Haocheng Ma, Kaiyue Song, and Yiqiang Zhao. "An Enhanced Logic Encryption Method with a Fully Correlated Key Interdependency Block." Electronics 8, no. 12 (2019): 1392. http://dx.doi.org/10.3390/electronics8121392.

Texto completo
Resumen
Logic encryption, as a hardware security technique, can protect integrated circuits (ICs) by inserting additional gates. The inserted gates guarantee that predefined outputs are only generated when correct key inputs are provided, preventing IC counterfeiting, intellectual property (IP) theft, and IC overproduction. To evaluate the logic encryption’s robustness, two major criteria are usually utilized, which are (1) the interdependency between the keys and (2) the output corruption against attacks, including path sensitization attack, SATbased attack, hill-climbing attack, etc. However, the ma
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Chaves, Cesar, Siavoosh Azad, Thomas Hollstein, and Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures." Journal of Low Power Electronics and Applications 9, no. 1 (2019): 7. http://dx.doi.org/10.3390/jlpea9010007.

Texto completo
Resumen
Denial of Service (DoS) attacks are an increasing threat for Multiprocessor System-on-Chip (MPSoC) architectures. By exploiting the shared resources on the chip, an attacker is able to prevent completion or degrade the performance of a task. This is extremely dangerous for MPSoCs used in critical applications. The Network-on-Chip (NoC), as a central MPSoC infrastructure, is exposed to this attack. In order to maintain communication availability, NoCs should be enhanced with an effective and precise attack detection mechanism that allows the triggering of effective attack mitigation mechanisms.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Yi, Junkai, and Xiaoyan Liu. "Deep Reinforcement Learning for Intelligent Penetration Testing Path Design." Applied Sciences 13, no. 16 (2023): 9467. http://dx.doi.org/10.3390/app13169467.

Texto completo
Resumen
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losses, and continuously improve security strategies. By systematically simulating various attack scenarios, it enables proactive risk assessment and the development of robust security measures. To address the problems of inaccurate path prediction and difficult convergence in the training process of attack path planning, an algorithm which combines
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Shen, Limin, Hui Li, Hongyi Wang, and Yihuan Wang. "Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications." Mobile Information Systems 2020 (June 5, 2020): 1–16. http://dx.doi.org/10.1155/2020/3407437.

Texto completo
Resumen
This study proposed an application behavior-detection method based on multifeature and process algebra for detecting privilege escalation attacks in Android applications. The five features of application that constituted the attack were determined through an analysis of the privilege escalation attack model. On the basis of the extraction of multiple features, process algebra was used to build the application-behavior model and the attack model. Strong equivalence relation was used to verify the application behavior. Finally, dataflow path detection is conducted among the applications that can
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Khlobystova, A. O., M. V. Abramov, A. L. Tulupyev, and A. A. Zolotin. "Search for the shortest trajectory of a social engeneering attack between a pair of users in a graph with transition probabilities." Information and Control Systems, no. 6 (December 18, 2018): 74–81. http://dx.doi.org/10.31799/1684-8853-2018-6-74-81.

Texto completo
Resumen
Introduction: Social engineering attacks can be divided into two types: direct (one-way) and multi-pass ones, passing through a chain of users. Normally, there are several propagation paths for a multi-pass social engineering attack between two users. Estimates of the probabilities of an attack to spread along different trajectories will differ. Purpose: Identification of the most critical (most probable) trajectory for a multi-pass social engineering attack between two users. Methods: Methods of searching, matching and algorithm analysis are used to identify the most critical trajectory of at
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Zhang, Xiaojian, Qi Wang, Xiangqun Wang, and Run Zhang. "Attack path analysis of power monitoring system based on attack graph." IOP Conference Series: Earth and Environmental Science 645 (January 26, 2021): 012064. http://dx.doi.org/10.1088/1755-1315/645/1/012064.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Zhang, Yan, Yong Wang, Yihua Hu, et al. "Security Performance Analysis of LEO Satellite Constellation Networks under DDoS Attack." Sensors 22, no. 19 (2022): 7286. http://dx.doi.org/10.3390/s22197286.

Texto completo
Resumen
Low Earth orbit satellite constellation networks (LSCNs) have attracted significant attention around the world due to their great advantages of low latency and wide coverage, but they also bring new challenges to network security. Distributed denial of service (DDoS) attacks are considered one of the most threatening attack methods in the field of Internet security. In this paper, a space-time graph model is built to identify the key nodes in LSCNs, and a DDoS attack is adopted as the main means to attack the key nodes. The scenarios of two-satellite-key-node and multi-satellite-key-node attac
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Yang, Jinwei, and Yu Yang. "Optimal Security Protection Selection Strategy Based on Markov Model Attack Graph." Journal of Physics: Conference Series 2132, no. 1 (2021): 012020. http://dx.doi.org/10.1088/1742-6596/2132/1/012020.

Texto completo
Resumen
Abstract Intrusion intent and path prediction are important for security administrators to gain insight into the possible threat behavior of attackers. Existing research has mainly focused on path prediction in ideal attack scenarios, yet the ideal attack path is not always the real path taken by an intruder. In order to accurately and comprehensively predict the path information of network intrusion, a multi-step attack path prediction method based on absorbing Markov chains is proposed. Firstly, the node state transfer probability normalization algorithm is designed by using the nil posterio
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Li, Yanna. "The Cyber Attack in the Use of Force." Lecture Notes in Education Psychology and Public Media 69, no. 1 (2024): 122–30. http://dx.doi.org/10.54254/2753-7048/69/20240165.

Texto completo
Resumen
Abstract: It is controversial whether cyber attacks can constitute the use of force, and it is also difficult to reduce cyber attacks in the use of force. This article will start from arguing the definition of using force, then discuss how can cyber attacks be interpreted as a form of using force and how to regulate cyber attacks from three orientations, which is a cyber attack that attributable to individuals, attributable to organizations, and attributable to countries. Finally, this article will focus on finding out a recommendation on how to identify a cyber attack with the one that can at
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Braimah, Joseph Odunayo, Tendai Makoni, and Fabio Mathias Correa. "Predicting the Path of Insurgency: Data-Driven Strategies to Counter Boko Haram in Nigeria." F1000Research 13 (September 2, 2024): 989. http://dx.doi.org/10.12688/f1000research.153978.1.

Texto completo
Resumen
Background While Boko Haram insurgency’s dangers are well documented, existing research lacks methods for effective monitoring and prediction, of their activities. This study addresses this gap by analyzing data from Nigerian Security Tracker website (https://www.cfr.org/nigeria/nigeria-security-tracker/p29483) from year 2011 to 2023 and geolocated information on Boko Haram activity. Methods The research employs a mixed-methods approach. It uses descriptive statistics to understand attack trends and time series models (ARIMA/SARIMA) to forecast future attacks. Additionally, control charts iden
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Chandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.

Texto completo
Resumen
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also co
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Yang, Rong, Fang Ming Huang, and Hua Jun Gong. "Best Attack Position Model for BVR Multi-Target Air Combat." Advanced Materials Research 1016 (August 2014): 511–15. http://dx.doi.org/10.4028/www.scientific.net/amr.1016.511.

Texto completo
Resumen
Refer to the characteristics of BVR air combat and multi-target attack for the Fourth Generation Fighters, this paper constructs and computes the model of probability distributions in multi-target kill zone, the model of the best attack path/attack position of multi-target attack. The model of probability distributions in multi-target kill zone considers heading angle and approaching angle of target, distance between fighter and target, maximum off-boresight launching angle and killing angle. The model of the best attack path/attack position considers damage probability to targets by missiles,
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Chen, Yun, Kun Lv, and Changzhen Hu. "A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2058429.

Texto completo
Resumen
Currently, many methods are available to improve the target network’s security. The vast majority of them cannot obtain an optimal attack path and interdict it dynamically and conveniently. Almost all defense strategies aim to repair known vulnerabilities or limit services in target network to improve security of network. These methods cannot response to the attacks in real-time because sometimes they need to wait for manufacturers releasing corresponding countermeasures to repair vulnerabilities. In this paper, we propose an improved Q-learning algorithm to plan an optimal attack path directl
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Li, Xiaohong, Ran Liu, Zhiyong Feng, and Ke He. "Threat modeling-oriented attack path evaluating algorithm." Transactions of Tianjin University 15, no. 3 (2009): 162–67. http://dx.doi.org/10.1007/s12209-009-0029-y.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Vitali, Maycon. "Web Cache Deception Attack." H2HC Magazine, no. 16 (October 22, 2022): 34–40. http://dx.doi.org/10.47986/16/2.

Texto completo
Resumen
Este artigo tem por finalidade apresentar uma classe de ataque não muito nova (apresentada inicialmente em 2017 por Omer Gil mas que, apesar de simples, é pouco explorada no cotidiano. Estamos falando do Web Cache Deception Attack, um ataque que tem por finalidade principal obter dados sensíveis de usuários legítimos de uma determinada aplicação afetada. Será apresentado uma fundamentação básica sobre serviços de cache, cujo conhecimento é necessário para o sucesso no ataque, além da vulnerabilidade de Path Confusion, que é a classe de vulnerabilidade utilizada para a execução do ataque aprese
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Wang, Weizhe, Pierrick Méaux, and Deng Tang. "Shortcut2Secrets: A Table-based Differential Fault Attack Framework." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 2 (2025): 385–419. https://doi.org/10.46586/tches.v2025.i2.385-419.

Texto completo
Resumen
Recently, Differential Fault Attacks (DFAs) have proven highly effective against stream ciphers designed for Hybrid Homomorphic Encryption (HHE). In this work, we present a table-based DFA framework called the shortcut attack, which generalizes the attack proposed by Wang and Tang on the cipher Elisabeth. The framework applies to a broad sub-family of ciphers following the Group Filter Permutator (GFP) paradigm and enhances previous DFAs by improving both the fault identification and path generation steps. Notably, the shortcut attack circumvents the issue of function representation, allowing
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Al-janabi, Rana Jumaa Surayh. "Messenger Attack(Problems and Solutions)." Journal of Kufa for Mathematics and Computer 1, no. 2 (2010): 12–22. http://dx.doi.org/10.31642/jokmc/2018/010202.

Texto completo
Resumen
For years, people think that the major threat to various companies' computer networks doesn't come from outside hackers,but from internal(often disgruntled) employees. However, a new study disputes that, saying that outside hack attacks are the largest threat. In fact, the outside hackers usethe ability of messenger to not only transfer text messages,but also to files transferring. Consequently, messengers can transfer worms and other malicious software ( malware).This research includes many practical methods and tricks to attack yahoo messenger by sending executable files that are compressed
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Guo, Mingyu, Jialiang Li, Aneta Neumann, Frank Neumann, and Hung Nguyen. "Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 9 (2022): 9360–67. http://dx.doi.org/10.1609/aaai.v36i9.21167.

Texto completo
Resumen
Active Directory is the default security management system for Windows domain networks. We study the shortest path edge interdiction problem for defending Active Directory style attack graphs. The problem is formulated as a Stackelberg game between one defender and one attacker. The attack graph contains one destination node and multiple entry nodes. The attacker's entry node is chosen by nature. The defender chooses to block a set of edges limited by his budget. The attacker then picks the shortest unblocked attack path. The defender aims to maximize the expected shortest path length for the
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Harmeet Singh, Er, and Dr Vijay Dhir. "A Novel Hybrid and Secure Clustering Black hole Attacks Mitigation Technique in Wireless LAN." International Journal of Engineering & Technology 7, no. 4.7 (2018): 389. http://dx.doi.org/10.14419/ijet.v7i4.7.23035.

Texto completo
Resumen
Wireless LAN is a dynamic network with large number of mobile nodes. As the traffic increases over the wireless, it will lead to number of problems like congestion and packet loss. This congestion and packet loss problems occurs due to the attacks in wireless LAN.Out of the various attacks black hole attack is most dangerous attack which drops all of the packets received from the source node and which act as a black hole in the universe. In this paper we are providing solution against this attack. We propose a Novel Hybrid and Secure Clustering Black hole Attack Mitigation Technique in Wireles
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Lin, Hsiao-Chung, Ping Wang, Wen-Hui Lin, and Yu-Hsiang Huang. "A Multiple-Swarm Particle Swarm Optimisation Scheme for Tracing Packets Back to the Attack Sources of Botnet." Applied Sciences 11, no. 3 (2021): 1139. http://dx.doi.org/10.3390/app11031139.

Texto completo
Resumen
Network intrusion detection systems that employ existing IP traceback (IPTBK) algorithms are generally unable to trace multiple attack sources. In these systems, the sampling mechanism only screens parts of the routing information, which leads to the tracing of the neighbour of the attack source and fails to identify the attack source. Theoretically, the multimodal optimisation problem cannot be solved for all of its multiple solutions using the traditional particle swarm optimisation (PSO) algorithm. The present study focuses on the use of multiple-swarm PSO (MSPSO) for recursively tracing at
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Elavarasan, R., K. Chitra, and Amsalu Gosu Adigo. "Enhanced Lion Optimization with Efficient Path Routing Equalization Technique against DoS Attack in Wireless Sensor Network." Wireless Communications and Mobile Computing 2022 (June 14, 2022): 1–9. http://dx.doi.org/10.1155/2022/3321870.

Texto completo
Resumen
In WSN, DoS (denial of service) attack makes shortcoming system. The packets travel over and over in the sensor network. By that, all the assets like data transmission, memory, and vitality are squandered by this attack. However, the attacker ought to optimize its attacker plan for request to boost the impact on the system performance because of the deficiency of vitality at the aggressor side. Denial of service (DoS) attack on the Internet has become a squeezing issue. By staying away from these sorts of attacks, network performance can be improved. Therefore, security is a fundamental requir
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!