Security data collection and data analytics in the internet: A survey
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …
detect security threats and measure the security of the Internet arises a significant research …
A survey of link flooding attacks in software defined network ecosystems
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …
attack that congests critical network links and can completely isolate the victim's network. In …
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks
The gas mechanism in Ethereum charges the execution of every operation to ensure that
smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated …
smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated …
SkyShield: A sketch-based defense system against application layer DDoS attacks
Application layer distributed denial of service (DDoS) attacks have become a severe threat
to the security of web servers. These attacks evade most intrusion prevention systems by …
to the security of web servers. These attacks evade most intrusion prevention systems by …
Cyberpulse: A machine learning based link flooding attack mitigation system for software defined networks
Software-defined networking (SDN) offers a novel paradigm for effective network
management by decoupling the control plane from the data plane thereby allowing a high …
management by decoupling the control plane from the data plane thereby allowing a high …
Detecting and mitigating target link-flooding attacks using SDN
J Wang, R Wen, J Li, F Yan, B Zhao… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
DDoS attacks have caused very serious damage to enterprise networks. Recently, a new
kind of DDoS attack called link-flooding attack (LFA), has surfaced and is already being …
kind of DDoS attack called link-flooding attack (LFA), has surfaced and is already being …
{NetHide}: Secure and practical network topology obfuscation
Simple path tracing tools such as traceroute allow malicious users to infer network
topologies remotely and use that knowledge to craft advanced denial-of-service (DoS) …
topologies remotely and use that knowledge to craft advanced denial-of-service (DoS) …
Mitigating crossfire attacks using SDN-based moving target defense
Recent research demonstrated that software defined networking (SDN) can be leveraged to
enable moving target defense (MTD) to mitigate distributed denial of service (DDoS) attacks …
enable moving target defense (MTD) to mitigate distributed denial of service (DDoS) attacks …
A novel framework for modeling and mitigating distributed link flooding attacks
C Liaskos, V Kotronis… - IEEE INFOCOM 2016 …, 2016 - ieeexplore.ieee.org
Distributed link-flooding attacks constitute a new class of attacks with the potential to
segment large areas of the Internet. Their distributed nature makes detection and mitigation …
segment large areas of the Internet. Their distributed nature makes detection and mitigation …
A survey of low-latency transmission strategies in software defined networking
B Yan, Q Liu, JL Shen, D Liang, B Zhao… - Computer Science …, 2021 - Elsevier
Abstract Software-defined networking (SDN), as a revolutionary networking paradigm,
provides a new solution for future network development and equipment manufacturing by …
provides a new solution for future network development and equipment manufacturing by …