In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhole attacks on Intrusion Detection Systems. More specifically, we pro-pose a mathematical framework for obtaining performance bounds of Byzantine attackers and the Intrusion Detection System (IDS) in terms of detection delay. We formulate the problem of distributed collaborative defense against coor-dinated attacks in MANET as a dynamic game problem. In our formulation we have on the one hand a group of attackers that observe what is going on in the network and coordinate their attack in an adaptive manner. On the other side, we have a group of defending nodes (the IDS nodes) that collaboratively observe the network and coordinate their actions...
While there are significant advances in information technology and infrastructure which offer new op...
Mobile ad hoc networks (MANETs) are self-configuring infrastructureless dynamic wireless networks in...
International audienceWith the rise of the Internet-of-Things, networks are becoming abundant and di...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
In this thesis, we consider the problems of detecting intrusions initiated by cooperative malicious ...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
Networked control systems consist of distributed sensors and actuators that communicate via a wirele...
A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure (i...
This dissertation present an accumulative feedback adaptation transmission rate scheme (AFAT) that e...
Game theory offers a promising approach toward modeling cyber attacks and countermeasures as games p...
While there are significant advances in information technology and infrastructure which offer new op...
Mobile ad hoc networks (MANETs) are self-configuring infrastructureless dynamic wireless networks in...
International audienceWith the rise of the Internet-of-Things, networks are becoming abundant and di...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
In this thesis, we consider the problems of detecting intrusions initiated by cooperative malicious ...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
Networked control systems consist of distributed sensors and actuators that communicate via a wirele...
A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure (i...
This dissertation present an accumulative feedback adaptation transmission rate scheme (AFAT) that e...
Game theory offers a promising approach toward modeling cyber attacks and countermeasures as games p...
While there are significant advances in information technology and infrastructure which offer new op...
Mobile ad hoc networks (MANETs) are self-configuring infrastructureless dynamic wireless networks in...
International audienceWith the rise of the Internet-of-Things, networks are becoming abundant and di...