Combating adversarial network topology inference by proactive topology obfuscation
The topology of a network is fundamental for building network infrastructure functionalities.
In many scenarios, enterprise networks may have no desire to disclose their topology …
In many scenarios, enterprise networks may have no desire to disclose their topology …
Proto: Proactive topology obfuscation against adversarial network topology inference
The topology of a network is fundamental for building network infrastructure functionalities.
In many scenarios, enterprise networks may have no desire to disclose their topology …
In many scenarios, enterprise networks may have no desire to disclose their topology …
Stealthy DGoS attack: DeGrading of service under the watch of network tomography
Network tomography is a powerful tool to monitor the internal state of a closed network that
cannot be measured directly, with broad applications in the Internet, overlay networks, and …
cannot be measured directly, with broad applications in the Internet, overlay networks, and …
MMP: A Dynamic Routing Protocol Design to Proactively Defend against Wireless Network Inference Attacks
Network inference refers to the process of extracting sensitive information from a network
without directly accessing it. This poses a significant threat to network security since it allows …
without directly accessing it. This poses a significant threat to network security since it allows …
Stealthy dgos attack against network tomography: The role of active measurements
As a tool to infer the internal state of a network that cannot be measured directly, network
tomography has been extensively studied under the assumption that the measurements …
tomography has been extensively studied under the assumption that the measurements …
A fault diagnosis method to defend scapegoating attack in network tomography
X Xu, Y Wang, Y Zhang, D Li - Theoretical Computer Science, 2023 - Elsevier
The scapegoating attack can cause persistent and inconspicuous performance degradation
in network tomography. Defense of scapegoating attack is therefore a critical problem …
in network tomography. Defense of scapegoating attack is therefore a critical problem …
Measurement integrity attacks against network tomography: Feasibility and defense
Network tomography is an important tool to estimate link metrics from end-to-end network
measurements. An implicit assumption in network tomography is that observed …
measurements. An implicit assumption in network tomography is that observed …
网络诊断技术研究综述
许晓佳, 王永才, 李德英 - 智能科学与技术学报, 2023 - infocomm-journal.com
网络诊断是一种高效且方便的通过端到端路径的性能测量来推断网络内部状态的方法,
在有线和无线网络的链路测量和故障定位中得到了广泛应用. 对网络诊断的4 …
在有线和无线网络的链路测量和故障定位中得到了广泛应用. 对网络诊断的4 …
Identification of Path Congestion Status for Network Performance Tomography using Deep Spatial-Temporal Learning
C Du, Z Yu, X Wang - arXiv preprint arXiv:2412.10762, 2024 - arxiv.org
Network tomography plays a crucial role in assessing the operational status of internal links
within networks through end-to-end path-level measurements, independently of cooperation …
within networks through end-to-end path-level measurements, independently of cooperation …
LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography
Network tomography is a powerful and convenient tool to infer the internal states of a
network via end-to-end path measurements. However, this article shows that when …
network via end-to-end path measurements. However, this article shows that when …