Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Dale Lindskog"'
Publikováno v:
TrustCom/BigDataSE
This research presents a pragmatic implementation of a hierarchical distributed intrusion detection system. Several hierarchical distributed intrusion detection architectures have been proposed for use in various network topologies. However, to our k
Publikováno v:
TrustCom/BigDataSE
In this paper, we propose methods for profiling normal network traffic, methods that could be employed for the purpose of creating a baseline that would be used in the detection of threshold based anomalies in network traffic. This profiling is based
Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization
Publikováno v:
FNC/MobiSPC
The focus of the paper is on providing insights on how ransomware have evolved from its starting till March 2016 by analyzing samples of selected ransomware variants from existing ransomware families in Windows and Android environments. Seventeen Win
Publikováno v:
Ad Hoc Networks ISBN: 9783319744384
ADHOCNETS
ADHOCNETS
In this paper, our interest is intrusion response in mobile ad hoc networks (MANET). All intrusion response systems (IRS) presuppose an underlying intrusion detection system (IDS). We propose improvements to an existing dynamic and hierarchical IDS a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7eebae4c30f705eeaa86bc38ae1e411d
https://doi.org/10.1007/978-3-319-74439-1_7
https://doi.org/10.1007/978-3-319-74439-1_7
Publikováno v:
International Journal for Information Security Research. 4:391-399
Autor:
Ting Zhang, Dale Lindskog
Publikováno v:
Journal of Internet Technology and Secured Transaction. 3:191-197
This paper proposes a routing storage and query mechanism for the ROFL firewall scheme, a mechanism that combines a hierarchical routing storage structure with a fast routing query method. ROFL, which stands for Routing as the Firewall Layer, is a fi
Autor:
Dale Lindskog, Jagjot Kaur
Publikováno v:
SIN
In this research paper, we describe an algorithm that could be implemented on an intrusion response system (IRS) designed specifically for mobile ad hoc networks (MANET). Designed to supplement a MANET's hierarchical intrusion detection system (IDS),
Publikováno v:
FNC/MobiSPC
Doxing is a term derived from documents, and hence consists of collecting information on an organization or individual through social media websites, search engines, password cracking methods, social engineering tools and other sources of publicly di
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::408458fc47b008e0b5fe9adb7368ba9d
Publikováno v:
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
This paper proposes a customization of the IETF RFC 6280 Geopriv to facilitate compliance of Wi-Fi positioning systems with existing privacy regulations. It is shown that APIs of existing Wi-Fi positioning systems, based on the distribution phase of
Publikováno v:
2016 4th International Symposium on Digital Forensic and Security (ISDFS).
Conventional biometric authentication systems store the biometric template or a hash of its digitization, which raises concerns around template privacy and revocability. In this paper, we propose a biometric hash generation scheme, where the normaliz