Buscar
Mostrando ítems 1-10 de 163
On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey
Organizations use Active Directory Windows service to authenticate users in a network with the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its resistance to the different types of ...
An approach to mitigate denial of service attacks in ieee 802.11 networks
(2014)
Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities ...
Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
(Universidade Federal de Minas GeraisUFMG, 2017-11-01)
Software Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete ...
Mitigação de ataques em redes definidas por software utilizando o sistema de detecção de intrusão baseado em rede Snort
(Araranguá, SC, 2021-05-17)
As Redes Definidas por Software (do inglês SDN) surgiram como um novo modelo de operações de rede de computadores para atender as crescentes demandas atuais das redes, que requerem rapidez na implementação e resposta a ...
Evaluación y mitigación de ataques reales a redes ip utilizando tecnologías de virtualización de libre distribución
(2012-12)
IP networks attacks can collapse the continuity of
business services affecting its image and causing economic
losses. This research focuses on the evaluation
of several IP networking real attacks using virtualization
platforms ...
New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks
(Mdpi, 2019-06-01)
In this work, two new self-tuning collaborative-based mechanisms for jamming detection are proposed. These techniques are named (i) Connected Mechanism and (ii) Extended Mechanism. The first one detects jamming by comparing ...
Diseño de un escenario de red virtual para la exploración y control de ataques basados en dns
(2019)
Most of the attacks based on DNS Domain Name System TCP IP protocol go unnoticed by most users, because the attacker conceals his identity so as to make others believe that it is only a failure in the network, unless there ...
DVNAT: a Dedicated Vehicular Network ArchiTecture against inconsistency and bad-mouthing attacks through a reputation system
(Universidade Federal de LavrasPrograma de Pós-Graduação em Ciência da ComputaçãoUFLAbrasilDepartamento de Ciência da Computação, 2021)