This book presents Double Guard, an IDS system that models the network behavior of user sessions across both the front-end web server and the back-end database. By monitoring both web and subsequent database requests, it is possible to ferret out attacks that independent IDS would not be able to identify. Furthermore, it is possible to quantify the limitations of any multi-tier IDS in terms of training sessions and functionality coverage. This work implemented Double Guard using an Apache web server with MySQL and lightweight virtualization.
This book presents Double Guard, an IDS system that models the network behavior of user sessions across both the front-end web server and the back-end...
In this book, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. This work illustrated the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. This work proves that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes...
In this book, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short per...