Transactions on Computational Science IV - Special Issue on Security in Computing (Paperback, 2009 ed.)


In the second contribution, entitled "Behavioral Characterization for Network Anomaly Detection," Victor P. Roche and Unai Arronategui propose a methodology for detecting abnormal traffic on the net, such as worm attacks, based on the obser- tion of the behavior of different elements at the network edges. This methodology means an advance in the detection of a new infection in the backbone of the network, but also in the identification of the infected hosts of a specific network. The authors try to detect network anomalies by tracking the behavior of different network levels. This proposed method is not based on intrinsic characteristics of the worm but on their manner of acting. This methodology has proved its effectiveness in real infections caused by viruses such as SpyBot and Agobot in accordance with experimental tests. In the third contribution, which is entitled "The Power of Anonymous Veto in Public Discussion," Feng Hao and Piotr Zielinski propose an exceptional solution--Anonymous Veto Network (or AV-net)--to allow a group of participants to compute a boolean-OR function securely. This protocol is provably secure under the Decision Diffie-Hellman (DDH) and random oracle assumptions.

R1,557

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles15570
Mobicred@R146pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 10 - 15 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

In the second contribution, entitled "Behavioral Characterization for Network Anomaly Detection," Victor P. Roche and Unai Arronategui propose a methodology for detecting abnormal traffic on the net, such as worm attacks, based on the obser- tion of the behavior of different elements at the network edges. This methodology means an advance in the detection of a new infection in the backbone of the network, but also in the identification of the infected hosts of a specific network. The authors try to detect network anomalies by tracking the behavior of different network levels. This proposed method is not based on intrinsic characteristics of the worm but on their manner of acting. This methodology has proved its effectiveness in real infections caused by viruses such as SpyBot and Agobot in accordance with experimental tests. In the third contribution, which is entitled "The Power of Anonymous Veto in Public Discussion," Feng Hao and Piotr Zielinski propose an exceptional solution--Anonymous Veto Network (or AV-net)--to allow a group of participants to compute a boolean-OR function securely. This protocol is provably secure under the Decision Diffie-Hellman (DDH) and random oracle assumptions.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Springer-Verlag

Country of origin

Germany

Series

Lecture Notes in Computer Science, 5430

Release date

April 2009

Availability

Expected to ship within 10 - 15 working days

First published

2009

Editors-in-chief

Dimensions

235 x 155 x 13mm (L x W x T)

Format

Paperback

Pages

263

Edition

2009 ed.

ISBN-13

978-3-642-01003-3

Barcode

9783642010033

Categories

LSN

3-642-01003-2



Trending On Loot