Articles with "flooding attacks" as a keyword



Photo by constant_lb from unsplash

Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis

Sign Up to like & get
recommendations!
Published in 2019 at "Wireless Personal Communications"

DOI: 10.1007/s11277-019-06166-8

Abstract: Due to their specific structure and plenty of their utilization, mobile ad-hoc networks are vulnerable to various attacks. An attack which impacts on network layer is referred to as flooding attack. By transmitting several packets,… read more here.

Keywords: attacks mobile; mobile hoc; flooding attacks; hoc networks ... See more keywords
Photo from wikipedia

A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks

Sign Up to like & get
recommendations!
Published in 2017 at "Cognitive Computation"

DOI: 10.1007/s12559-017-9519-8

Abstract: Router advertisement (RA) flooding attack aims to exhaust all node resources, such as CPU and memory, attached to routers on the same link. A biologically inspired machine learning-based approach is proposed in this study to… read more here.

Keywords: machine; router advertisement; ipv6; detect ... See more keywords
Photo from wikipedia

On Modeling Link Flooding Attacks and Defenses

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3131503

Abstract: The emerging link flooding attacks (LFAs) are one type of attacks that attract significant attention in both academia and industry against the routing infrastructure. The attack traffic flows originating from bots (e.g., compromised IoT devices)… read more here.

Keywords: attack interference; flooding attacks; modeling link; attacks defenses ... See more keywords
Photo by hajjidirir from unsplash

RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3118081

Abstract: Link-flooding attacks (LFAs) are a new type of distributed denial-of-service (DDoS) attacks that can substantially damage network connectivity. LFAs flows are seemingly legitimate at the origin. But their cumulative volume at critical links causes congestion.… read more here.

Keywords: reinforcement learning; reinforcement; flooding attacks; link flooding ... See more keywords
Photo from wikipedia

STOP: A Service Oriented Internet Purification Against Link Flooding Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3152406

Abstract: Internet purification is a necessary technique to defend against Distributed Denial-of-Service (DDoS) attack. It can help Internet Service Provider (ISP) to completely and precisely scrub attack traffic through establishing the sender-receiver pair based filtering rules… read more here.

Keywords: flooding attacks; service; stop service; link flooding ... See more keywords
Photo by constant_lb from unsplash

Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Network Science and Engineering"

DOI: 10.1109/tnse.2022.3206581

Abstract: In Named Data Networking (NDN), Collusive Interest Flooding Attacks (CIFA) is a new type of Distributed Denial of Service (DDoS) attacks, which can effectively affect the performance of NDN by sending malicious Interests intermittently. Since… read more here.

Keywords: gbm fusion; flooding attacks; detection; interest flooding ... See more keywords