Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Thakur, Manoj RameshChandra"'
Autor:
Thakur, Manoj RameshChandra
Dynamic taint tracking is the process of assigning label to variables in a program and then tracking the flow of the labels as the program executes. Dynamic taint tracking for java applications is achieved by instrumenting the application ie. adding
Externí odkaz:
http://arxiv.org/abs/2411.19354
Autor:
Thakur, Manoj Rameshchandra, Khilnani, Divye Raj, Gupta, Kushagra, Jain, Sandeep, Agarwal, Vineet, Sane, Suneeta, Sanyal, Sugata, Dhekne, Prabhakar S
One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A
Externí odkaz:
http://arxiv.org/abs/1312.1629
The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the interactions on a social networking web
Externí odkaz:
http://arxiv.org/abs/1212.1914
Autor:
Thakur, Manoj Rameshchandra
Bots, in recent times, have posed a major threat to enterprise networks. With the distributed nature of the way in which botnets operate, the problems faced by enterprises have become acute. A bot is a program that operates as an agent for a user and
Externí odkaz:
http://arxiv.org/abs/1207.0122
A number of systems in recent times suffer from attacks like DDoS and Ping of Death. Such attacks result in loss of critical system resources and CPU cycles, as these compromised systems behave in an abnormal manner. The effect of such abnormalities
Externí odkaz:
http://arxiv.org/abs/1206.2307
A number of works in the field of intrusion detection have been based on Artificial Immune System and Soft Computing. Artificial Immune System based approaches attempt to leverage the adaptability, error tolerance, self- monitoring and distributed na
Externí odkaz:
http://arxiv.org/abs/1205.4457
In this paper, we suggest a multi-dimensional approach towards intrusion detection. Network and system usage parameters like source and destination IP addresses; source and destination ports; incoming and outgoing network traffic data rate and number
Externí odkaz:
http://arxiv.org/abs/1205.2340
Autor:
Thakur, Manoj Rameshchandra, Khilnani, Divye Raj, Gupta, Kushagra, Jain, Sandeep, Agarwal, Vineet, Sane, Suneeta, Sanyal, Sugata, Dhekne, Prabhakar S.
Publikováno v:
International Journal of Wireless and Mobile Computing; January 2012, Vol. 5 Issue: 2 p144-153, 10p