Designing energy-aware collaborative intrusion detection in IoT networks

W Li, P Rosenberg, M Glisby, M Han - Journal of Information Security and …, 2024 - Elsevier
Abstract The Internet of Things (IoT) with its evolution brings many benefits to people's
routine life, while at the same time posing various security challenges, due to the lack of …

[PDF][PDF] Tag based client side detection of content sniffing attacks with file encryption and file splitter technique

SIA Qadri, K Pandey - International Journal of Advanced Computer …, 2012 - Citeseer
In this paper we provide a security framework for server and client side. In this we provide
some prevention methods which will apply for the server side and alert replication is also on …

Towards securing challenge-based collaborative intrusion detection networks via message verification

W Li, W Meng, Y Wang, J Han, J Li - Information Security Practice and …, 2018 - Springer
With the increasing number of Internet-of-Things (IoT) devices, intrusion detection systems
(IDSs) have been widely deployed in a distributed or collaborative setting, in which a …

QoS2: a framework for integrating quality of security with quality of service

T Taleb, Y Hadjadj‐Aoul - Security and communication …, 2012 - Wiley Online Library
Different security measures have emerged to encounter various Internet security threats,
ensuring a certain level of protection against them. However, this does not come without a …

[PDF][PDF] Analysis and response of SSH brute force attacks in multi-user computing environment

JK Lee, SJ Kim, J Woo, CY Park - KIPS Transactions on …, 2015 - scholar.archive.org
ABSTRACT SSH provides a secure, encrypted communication channel between two end
point systems using public key encryption. But SSH brute force attack is one of the most …

Secure way routing protocol for mobile ad hoc network

J Rajeshwar, G Narsimha - Wireless Networks, 2017 - Springer
Mobile adhoc network is dynamic in nature and it operates completely in an infrastructure-
less environment. It discovers the way routes dynamically to reach the destination. Securing …

[HTML][HTML] 基于支持向量机的加密流量识别方法

程光, 陈玉祥 - 东南大学学报(自然科学版), 2017 - fx361.com
针对现有的加密流量识别方法难以区分加密流量和非加密压缩文件流量的问题,
对互联网中的加密流量, txt 流量, doc 流量, jpg 流量和压缩文件流量进行分析 …

Timing analysis of ssl/tls man in the middle attacks

K Benton, T Bross - arXiv preprint arXiv:1308.3559, 2013 - arxiv.org
Man in the middle attacks are a significant threat to modern e-commerce and online
communications, even when such transactions are protected by TLS. We intend to show that …

Rule‐Based Approach for Botnet Behavior Analysis

S Raheja, G Munjal, J Jangra… - Intelligent Data Analytics …, 2021 - Wiley Online Library
Botnets pose as serious threat and huge loss to organizations. The presence of botnet traffic
in any network is a matter of serious concern. They are used for many activities of malicious …

Detection of MITM attack in LAN environment using payload matching

D Al Abri - 2015 IEEE International Conference on Industrial …, 2015 - ieeexplore.ieee.org
Man-in-the-Middle (MITM) attack enables an attacker to monitor the communication
exchange between two parties by directing the traffic between them to pass through the …