Security data collection and data analytics in the internet: A survey

X Jing, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

A survey of link flooding attacks in software defined network ecosystems

R ur Rasool, H Wang, U Ashraf, K Ahmed… - Journal of Network and …, 2020 - Elsevier
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …

An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks

T Chen, X Li, Y Wang, J Chen, Z Li, X Luo… - … Security Practice and …, 2017 - Springer
The gas mechanism in Ethereum charges the execution of every operation to ensure that
smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated …

SkyShield: A sketch-based defense system against application layer DDoS attacks

C Wang, TTN Miu, X Luo, J Wang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Application layer distributed denial of service (DDoS) attacks have become a severe threat
to the security of web servers. These attacks evade most intrusion prevention systems by …

Cyberpulse: A machine learning based link flooding attack mitigation system for software defined networks

RU Rasool, U Ashraf, K Ahmed, H Wang… - IEEE …, 2019 - ieeexplore.ieee.org
Software-defined networking (SDN) offers a novel paradigm for effective network
management by decoupling the control plane from the data plane thereby allowing a high …

Detecting and mitigating target link-flooding attacks using SDN

J Wang, R Wen, J Li, F Yan, B Zhao… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
DDoS attacks have caused very serious damage to enterprise networks. Recently, a new
kind of DDoS attack called link-flooding attack (LFA), has surfaced and is already being …

{NetHide}: Secure and practical network topology obfuscation

R Meier, P Tsankov, V Lenders, L Vanbever… - 27th USENIX Security …, 2018 - usenix.org
Simple path tracing tools such as traceroute allow malicious users to infer network
topologies remotely and use that knowledge to craft advanced denial-of-service (DoS) …

Mitigating crossfire attacks using SDN-based moving target defense

A Aydeger, N Saputro, K Akkaya… - 2016 IEEE 41st …, 2016 - ieeexplore.ieee.org
Recent research demonstrated that software defined networking (SDN) can be leveraged to
enable moving target defense (MTD) to mitigate distributed denial of service (DDoS) attacks …

A novel framework for modeling and mitigating distributed link flooding attacks

C Liaskos, V Kotronis… - IEEE INFOCOM 2016 …, 2016 - ieeexplore.ieee.org
Distributed link-flooding attacks constitute a new class of attacks with the potential to
segment large areas of the Internet. Their distributed nature makes detection and mitigation …

A survey of low-latency transmission strategies in software defined networking

B Yan, Q Liu, JL Shen, D Liang, B Zhao… - Computer Science …, 2021 - Elsevier
Abstract Software-defined networking (SDN), as a revolutionary networking paradigm,
provides a new solution for future network development and equipment manufacturing by …