LinkScope: Toward Detecting Target Link Flooding Attacks
نویسندگان
چکیده
منابع مشابه
LinkScope: Towards Detecting Target Link Flooding Attacks
A new class of target link flooding attacks (LFA) can cut off the Internet connections of a target area without being detected because they employ legitimate flows to congest selected links. Although new mechanisms for defending against LFA have been proposed, the deployment issues limit their usage since they require either additional modules to enhance routers or using the software-defined ne...
متن کاملTowards Detecting Target Link Flooding Attack
A new class of target link flooding attacks (LFA) can cut off the Internet connections of a target area without being detected because they employ legitimate flows to congest selected links. Although new mechanisms for defending against LFA have been proposed, the deployment issues limit their usages since they require modifying routers. In this paper, we propose LinkScope, a novel system that ...
متن کاملDetecting SYN Flooding Attacks
We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity of our detection mechanism lies in its statelessness and low computation overhead, which make the detec...
متن کاملDetecting SYN Flooding Attacks Near Innocent Side
DistributedDenial-of-Service (DDoS) attacks seriously threat the servers in the Internet.Most of current research is focused on the detection and preventionmethods at the victim side or the source side. However, defense at the innocent side, whose IP is used as the spoofed IP by the attacker, is always ignored. In this paper, a novelmethod at the innocent side has been proposed. Our detection s...
متن کاملMitigating Link-flooding Attacks With Active Link Obfuscation
Link-flooding attack (LFA) has emerged as a serious threat to Internet which cuts off connections between legitimate hosts and targeted servers by flooding only a few links (e.g., target links). Several mechanisms have been proposed to mitigate LFA, however, they can only mitigate LFA after target links have been compromised by adversaries. Based on the fact that adversaries rely on network lin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2018
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2018.2815555