Abstract | ||
---|---|---|
A new class of target link flooding attacks (LFAs) can cut off the Internet connections of a target area without being detected, because they employ legitimate flows to congest selected links. Although new mechanisms for defending against LFA have been proposed, the deployment issues limit their usage, since they require either additional modules to enhance routers or using the software-defined ne... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/TIFS.2018.2815555 | IEEE Transactions on Information Forensics and Security |
Keywords | Field | DocType |
Topology,Network topology,Monitoring,Web servers,Schedules | Computer vision,False positive rate,Overhead (computing),Software deployment,Network measurement,Profiling (computer programming),Computer science,Testbed,Computer network,Bandwidth (signal processing),Artificial intelligence,The Internet | Journal |
Volume | Issue | ISSN |
13 | 10 | 1556-6013 |
Citations | PageRank | References |
2 | 0.37 | 0 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lei Xue | 1 | 103 | 16.03 |
Xiaobo Ma | 2 | 43 | 7.98 |
Xiapu Luo | 3 | 1302 | 110.23 |
Edmond W. W. Chan | 4 | 543 | 30.15 |
TungNgai Miu | 5 | 2 | 0.71 |
Guofei Gu | 6 | 3361 | 173.45 |