Index Terms
- Technical perspective: Fake 'likes' and targeting collusion networks
Recommendations
An Enhanced Threat Identification Approach for Collusion Threats
METRISEC '11: Proceedings of the 2011 Third International Workshop on Security Measurements and MetricsColluding threat agents are a serious and difficult problem to deal with in any organization. Collusion is possible at any level and with any entity inside or outside the organization. Traditional methods cannot effectively deal with legitimate users ...
Defense against packet collusion attacks in opportunistic networks
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics such as an open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security ...
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks
In multihop wireless networks (MWNs), the selective forwarding attack is a special case of denial of service attack. In this attack, the malicious wireless nodes only forward a subset of the received packets, but drop the others. This attack becomes more ...
Comments