[PDF][PDF] Leveraging prefix structure to detect volumetric ddos attack signatures with programmable switches

C Misa, R Durairajan, R Rejaie… - Proceedings of the IEEE …, 2024 - ix.cs.uoregon.edu
Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with Programmable
Switches Page 1 Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with …

I can still observe you: Flow-level behavior fingerprinting for online social network

Y Feng, J Luo, C Ma, T Li, L Hui - GLOBECOM 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
The privacy of online social networks (OSNs) remains a major concern for today's Internet.
Researchers have demonstrated that by analyzing inter-packet or packet-level network …

[PDF][PDF] Toward finer granularity analysis of network traffic

Y Feng - Area Exam, 2022 - researchgate.net
Fine-grained traffic analysis (FGTA), as an advanced form of traffic analysis (TA), aims to
analyze network traffic to deduce information related to application-layer activities, fine …

[PDF][PDF] Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis

Y Feng, J Li, J Mirkovic - yebof.github.io
Fine-grained traffic analysis (FGTA), as an advanced form of traffic analysis (TA), aims to
analyze network traffic to deduce information related to application-layer activities, fine …

[PDF][PDF] EIReLaND: Evaluating and Interpreting Reinforcement-Learning-based Network Defenses

S Cheung, J Claypoole, P Sharma, V Yegneswaran… - csl.sri.com
This paper explores the application of goaloriented machine-learning techniques, and in
particular leveraging recent advances in deep reinforcement-learning (RL) networks to …

[引用][C] Data-Fusion for Prefix-Level Inference: A DDoS Case Study

CM UO, RD UO, RR UO, W Willinger