A comprehensive survey on DDoS defense systems: New trends and challenges
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
Detecting tunneled flooding traffic via deep semantic analysis of packet length patterns
Distributed denial-of-service (DDoS) protection services capture various flooding attacks by
analyzing traffic features. However, existing services are unable to accurately detect …
analyzing traffic features. However, existing services are unable to accurately detect …
Security performance analysis of Leo satellite constellation networks under DDoS attack
Y Zhang, Y Wang, Y Hu, Z Lin, Y Zhai, L Wang, Q Zhao… - Sensors, 2022 - mdpi.com
Low Earth orbit satellite constellation networks (LSCNs) have attracted significant attention
around the world due to their great advantages of low latency and wide coverage, but they …
around the world due to their great advantages of low latency and wide coverage, but they …
DNS Congestion Control in Adversarial Settings
We instigate the study of adversarial congestion in the context of the Domain Name System
(DNS). By strategically choking inter-server channels, this new type of DoS attack can …
(DNS). By strategically choking inter-server channels, this new type of DoS attack can …
Advanced analysis of email sender spoofing attack and related security problems
B Yu, P Li, J Liu, Z Zhou, Y Han… - 2022 IEEE 9th …, 2022 - ieeexplore.ieee.org
A mail spoofing attack is a harmful activity that modifies the source of the mail and trick users
into believing that the message originated from a trusted sender whereas the actual sender …
into believing that the message originated from a trusted sender whereas the actual sender …
On implementing a simulation environment for a cooperative multi-agent learning approach to mitigate drdos attacks
T Kawazoe, N Fukuta - International Joint Conference on Artificial …, 2022 - Springer
One of serious threats on the Internet is a Distributed Reflective Denial-of-Service (DRDoS)
attack. We are aiming to realize defenders that can deal with more sophisticated cooperative …
attack. We are aiming to realize defenders that can deal with more sophisticated cooperative …
Toward Adaptive DDoS-Filtering Rule Generation
Despite various distributed denial-of-service (DDoS) filtering solutions proposed and
deployed throughout the Internet, DDoS attacks continue to evolve and successfully …
deployed throughout the Internet, DDoS attacks continue to evolve and successfully …
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction
H Li, Y Zhao, W Yao, K Xu, Q Li - Science China Information Sciences, 2023 - Springer
Distributed denial of service (DDoS) detection is still an open and challenging problem. In
particular, sophisticated attacks, eg, attacks that disguise attack packets as benign traffic …
particular, sophisticated attacks, eg, attacks that disguise attack packets as benign traffic …
Overview of blockchain assets theft attacks and defense technology.
YU Beiyuan, REN Shanyao… - Chinese Journal of …, 2023 - search.ebscohost.com
Abstract Since Satoshi Nakamoto's introduction of Bitcoin as a peer-to-peer electronic cash
system, blockchain technology has been developing rapidly especially in the fields of digital …
system, blockchain technology has been developing rapidly especially in the fields of digital …
区块链资产窃取攻击与防御技术综述
余北缘, 任珊瑶, 刘建伟 - 网络与信息安全学报 - infocomm-journal.com
自中本聪提出比特币以来, 区块链技术得到了跨越式发展, 特别是在数字资产转移及电子货币
支付方面. 以太坊引入智能合约代码, 使其具备了同步及保存智能合约程序执行状态 …
支付方面. 以太坊引入智能合约代码, 使其具备了同步及保存智能合约程序执行状态 …