The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Conjunctive searchable encryption is an efficient way to perform multi-keyword search over encrypted data in cloud storage. However, most existing methods do not take into account the integrity verification of the search result. Moreover, existing integrity verification methods can only verify the integrity of single-keyword search results, which cannot meet the requirements of conjunctive search...
Botnets have attracted lots of attention since botnet-based attacking is becoming one of the most serious threats on the Internet. Lots of approaches have been proposed to detect the presence of botnets. However, most of them just focus on offline detection methods by tracking the historical network traffic, which is not suitable for fast detection in the current environment. In this paper, we propose...
Botnet detection has attracted lots of attention. But few works have considered online detection. In this paper, we propose a novel approach that can monitor the botnet activities in real time. We define the concept of ldquofeature streamrdquo to describe raw network traffics. If some feature streams show high similarities, the corresponding host will be regarded as suspicious bots which will be added...
In this paper, it is advocated that defenders should take active action to stop DDoS attacks. We propose a new model based on differential games theory. Four main actors are included, attacker, defender, victim, and Botnet. It is our belief that victims who experience an attack should cooperate with defender to defend for a DDoS-attack. The model indicates the minimum number of bots that should blocked...
In this paper, it is advocated that defenders should take active action to stop DDoS attacks. We propose a new model based on differential games theory. Four main actors are included, attacker, defender, victim, and botnet. It is our belief that victims who experience an attack should cooperate with defender to defend for a DDoS-attack. The model indicates the minimum number of Bots that should blocked...
In this paper, it is advocated that defenders should take active action to stop DDoS attacks. We propose a new model based on differential games theory. Four main actors are included, attacker, defender, victim, and botnet. It is our belief that victims who experience an attack should cooperate with defender to defend for a DDoS-attack. The model indicates the minimum number of bots that should blocked...
In this paper, we advocate that routers will filter bandwidth depletion of DDoS traffic. It is our consideration that server owners who experience an attack should work with ISP routers to defend DDoS. The main idea is to use statistical approaches of Netflow to allocate weighted bandwidth at the routers. We propose a new algorithm based on genetic algorithm to filter traffic on routers and maximize...
In this paper, we advocate that routers will filter bandwidth depletion of DDoS traffic. It is our consideration that server owners who experience an attack should work with ISP routers to defend DDoS. The main idea is to use statistical approaches of Netflow to allocate weighted bandwidth at the routers. We propose a new algorithm based on Genetic Algorithm to filter traffic on routers and maximize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.