Academic literature on the topic 'Link Flooding Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Link Flooding Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Link Flooding Attacks"
Hsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (November 12, 2021): 12514. http://dx.doi.org/10.3390/su132212514.
Full textWang, Xin, Xiaobo Ma, Jiahao Peng, Jianfeng Li, Lei Xue, Wenjun Hu, and Li Feng. "On Modeling Link Flooding Attacks and Defenses." IEEE Access 9 (2021): 159198–217. http://dx.doi.org/10.1109/access.2021.3131503.
Full textXue, Lei, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, Tony T. N. Miu, and Guofei Gu. "LinkScope: Toward Detecting Target Link Flooding Attacks." IEEE Transactions on Information Forensics and Security 13, no. 10 (October 2018): 2423–38. http://dx.doi.org/10.1109/tifs.2018.2815555.
Full textChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen, and Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Full textWang, Lei, Qing Li, Yong Jiang, Xuya Jia, and Jianping Wu. "Woodpecker: Detecting and mitigating link-flooding attacks via SDN." Computer Networks 147 (December 2018): 1–13. http://dx.doi.org/10.1016/j.comnet.2018.09.021.
Full textWang, Juan, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, and Fajiang Yu. "Detecting and Mitigating Target Link-Flooding Attacks Using SDN." IEEE Transactions on Dependable and Secure Computing 16, no. 6 (November 1, 2019): 944–56. http://dx.doi.org/10.1109/tdsc.2018.2822275.
Full textLu, Ning, Junwei Zhang, Ximeng Liu, Wenbo Shi, and Jianfeng Ma. "STOP: A Service Oriented Internet Purification Against Link Flooding Attacks." IEEE Transactions on Information Forensics and Security 17 (2022): 938–53. http://dx.doi.org/10.1109/tifs.2022.3152406.
Full textGkounis, Dimitrios, Vasileios Kotronis, Christos Liaskos, and Xenofontas Dimitropoulos. "On the Interplay of Link-Flooding Attacks and Traffic Engineering." ACM SIGCOMM Computer Communication Review 46, no. 2 (April 9, 2016): 5–11. http://dx.doi.org/10.1145/2935634.2935636.
Full textAydeger, Abdullah, Mohammad Hossein Manshaei, Mohammad Ashiqur Rahman, and Kemal Akkaya. "Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach." IEEE Transactions on Network Science and Engineering 8, no. 1 (January 1, 2021): 751–64. http://dx.doi.org/10.1109/tnse.2021.3052090.
Full textRasool, Raihan ur, Hua Wang, Usman Ashraf, Khandakar Ahmed, Zahid Anwar, and Wajid Rafique. "A survey of link flooding attacks in software defined network ecosystems." Journal of Network and Computer Applications 172 (December 2020): 102803. http://dx.doi.org/10.1016/j.jnca.2020.102803.
Full textDissertations / Theses on the topic "Link Flooding Attacks"
Kang, Min Suk. "Handling Large-Scale Link-Flooding Attacks in the Internet." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/833.
Full textLee, Soo Bum. "Localizing the effects of link flooding attacks in the internet." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/10052.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Rasool, Raihan Ur. "CyberPulse: A Security Framework for Software-Defined Networks." Thesis, 2020. https://vuir.vu.edu.au/42172/.
Full textBook chapters on the topic "Link Flooding Attacks"
Cui, Yong, Lingjian Song, and Ke Xu. "RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks." In Information Networking. Advances in Data Communications and Wireless Networks, 764–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11919568_76.
Full textKang, Min Suk, Virgil D. Gligor, and Vyas Sekar. "Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents." In Security Protocols XXIV, 47–57. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62033-6_7.
Full textRezazad, Mostafa, Matthias R. Brust, Mohammad Akbari, Pascal Bouvry, and Ngai-Man Cheung. "Detecting Target-Area Link-Flooding DDoS Attacks Using Traffic Analysis and Supervised Learning." In Advances in Intelligent Systems and Computing, 180–202. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03405-4_12.
Full textGligor, Virgil D. "Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion)." In Security Protocols XXIV, 58–66. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62033-6_8.
Full textPeng, Jiahao, Xiaobo Ma, Jianfeng Li, Lei Xue, and Wenjun Hu. "Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks." In Network and System Security, 436–51. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02744-5_32.
Full textYang, Guosong, and João P. Hespanha. "Modeling and Mitigating Link-Flooding Distributed Denial-of-Service Attacks via Learning in Stackelberg Games." In Handbook of Reinforcement Learning and Control, 433–63. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60990-0_15.
Full textNalayini, C. M., and Jeevaa Katiravan. "Block Link Flooding Algorithm for TCP SYN Flooding Attack." In International Conference on Computer Networks and Communication Technologies, 895–905. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_83.
Full textXie, Lixia, Ying Ding, and Hongyu Yang. "Mitigating Link-Flooding Attack with Segment Rerouting in SDN." In Cyberspace Safety and Security, 57–69. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_6.
Full textPonnusamy, Vasaki, Naveena Devi Regunathan, Pardeep Kumar, Robithoh Annur, and Khalid Rafique. "A Review of Attacks and Countermeasures in Internet of Things and Cyber Physical Systems." In Industrial Internet of Things and Cyber-Physical Systems, 1–24. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2803-7.ch001.
Full textGanesan, Sangeetha, Vijayalakshmi Muthuswamy, Ganapathy Sannasi, and Kannan Arputharaj. "A Comprehensive Analysis of Congestion Control Models in Wireless Sensor Networks." In Sensor Technology, 1194–214. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch057.
Full textConference papers on the topic "Link Flooding Attacks"
Kim, Jinwoo, and Seungwon Shin. "Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks." In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W). IEEE, 2017. http://dx.doi.org/10.1109/dsn-w.2017.10.
Full textBelabed, Dallal, Mathieu Bouet, and Vania Conan. "Centralized Defense Using Smart Routing Against Link-Flooding Attacks." In 2018 2nd Cyber Security in Networking Conference (CSNet). IEEE, 2018. http://dx.doi.org/10.1109/csnet.2018.8602966.
Full textWang, Zhaoxu, Huachun Zhou, Bohao Feng, Wei Quan, and Shui Yu. "MTF: Mitigating Link Flooding Attacks in Delay Tolerant Networks." In 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2018. http://dx.doi.org/10.1109/smartworld.2018.00264.
Full textDing, Xuyang, Feng Xiao, Man Zhou, and Zhibo Wang. "Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00040.
Full textKang, Min Suk, Virgil D. Gligor, and Vyas Sekar. "SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2016. http://dx.doi.org/10.14722/ndss.2016.23147.
Full textLee, Soo Bum, and Virgil D. Gligor. "FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks." In 2010 IEEE 30th International Conference on Distributed Computing Systems. IEEE, 2010. http://dx.doi.org/10.1109/icdcs.2010.78.
Full textLiaskos, Christos, Vasileios Kotronis, and Xenofontas Dimitropoulos. "A novel framework for modeling and mitigating distributed link flooding attacks." In IEEE INFOCOM 2016 - IEEE Conference on Computer Communications. IEEE, 2016. http://dx.doi.org/10.1109/infocom.2016.7524507.
Full textChen, Xu, Wei Feng, Ning Ge, and Xianbin Wang. "Defending Link Flooding Attacks under Incomplete Information: A Bayesian Game Approach." In ICC 2020 - 2020 IEEE International Conference on Communications (ICC). IEEE, 2020. http://dx.doi.org/10.1109/icc40277.2020.9148653.
Full textAydeger, Abdullah, Nico Saputro, and Kemal Akkaya. "Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks." In MILCOM 2018 - IEEE Military Communications Conference. IEEE, 2018. http://dx.doi.org/10.1109/milcom.2018.8599803.
Full textXing, Junchi, Jingjing Cai, Boyang Zhou, and Chunming Wu. "A Deep ConvNet-Based Countermeasure to Mitigate Link Flooding Attacks Using Software-Defined Networks." In 2019 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2019. http://dx.doi.org/10.1109/iscc47284.2019.8969595.
Full textReports on the topic "Link Flooding Attacks"
Lee, Soo B., and Virgil D. Gligor. FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. Fort Belvoir, VA: Defense Technical Information Center, November 2011. http://dx.doi.org/10.21236/ada580050.
Full textLee, Soo B., and Virgil D. Gligor. FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks. Fort Belvoir, VA: Defense Technical Information Center, November 2011. http://dx.doi.org/10.21236/ada582042.
Full textRamanujan, Ranga S., Doug Harper, Maher Kaddoura, David Baca, John Wu, and Kevin Millikin. Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada436292.
Full text