… Under these constraints, we propose the following algorithm to mitigatemalicious attacks. In the original network we swap the connections of two randomly chosen edges, that is, the …
E Stalmans, B Irwin - 2011 Information Security for South Africa, 2011 - ieeexplore.ieee.org
… for detecting maliciousnetworkactivity through DNS … of malicious fast-flux service networks through the passive analysis of recursive DNS traffic traces [7]. Common features in malicious …
I Hafeez, M Antikainen, AY Ding… - … on Network and …, 2020 - ieeexplore.ieee.org
… IoT device generating this activity, and … maliciousnetworkactivity. Our evaluation also shows that IOT-KEEPER has low resource footprint, and it can detect and mitigate various network …
… the OS activities and legitimate traffic. It is difficult to detect and distinct maliciousactivities as … (ii) In order to evade from the network security restrictions, the attacker makes use of trusted …
A Naveena, KRL Reddy - Information Security Journal: A Global …, 2018 - Taylor & Francis
… to accommodate defense against malicious attacker. Malicious nodes have opportunities to … functions, and elliptic curve cryptographic to mitigate attacks in the MANET. The simulation is …
MMA Mutalib, Z Zainol… - 2021 6th IEEE International …, 2021 - ieeexplore.ieee.org
… in the IT network environment can be detected and identified by the CMERP sensor system. Collection of information from network sandboxes such as malicious binary, network traffic, …
A Herbert, B Irwin - Southern Africa Telecommunication Networks …, 2016 - researchgate.net
… to better mitigatemaliciousactivities targeted at the network, or within the network itself. … [17], can provide mitigation of maliciousnetworkactivity on your behalf in order to keep one’…
… target network address using a service point address, packets/traffic are filtered. The malicious flood mitigation … incoming packets/traffic on the home network using Table-r3 data. The …
T Mahjabin, Y Xiao, G Sun… - … Sensor Networks, 2017 - journals.sagepub.com
… Also, another and more vulnerable impact of the attack is the depletion of the network bandwidths. In this case, an excessive amount of malicious flows overwhelm the network …