Survey on cyberspace security

H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

[PDF][PDF] Poisoning network visibility in software-defined networks: New attacks and countermeasures.

S Hong, L Xu, H Wang, G Gu - Ndss, 2015 - researchgate.net
Software-Defined Networking (SDN) is a new networking paradigm that grants a controller
and its applications an omnipotent power to have holistic network visibility and flexible …

{HorusEye}: A Realtime {IoT} Malicious Traffic Detection Framework using Programmable Switches

Y Dong, Q Li, K Wu, R Li, D Zhao, G Tyson… - 32nd USENIX Security …, 2023 - usenix.org
The ever-growing volume of IoT traffic brings challenges to IoT anomaly detection systems.
Existing anomaly detection systems perform all traffic detection on the control plane, which …

Frequency domain feature based robust malicious traffic detection

C Fu, Q Li, M Shen, K Xu - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

Effective topology tampering attacks and defenses in software-defined networks

R Skowyra, L Xu, G Gu, V Dedhia… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
As Software-Defined Networking has gained increasing prominence, new attacks have been
demonstrated which can corrupt the SDN controller's view of network topology. These …

Man-in-the-middle attacks without rogue AP: when WPAs meet ICMP redirects

X Feng, Q Li, K Sun, Y Yang… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Modern Wi-Fi networks are commonly protected by the security mechanisms, eg, WPA,
WPA2 or WPA3, and thus it is difficult for an attacker (a malicious supplicant) to hijack the …

{Off-Path} Network Traffic Manipulation via Revitalized {ICMP} Redirect Attacks

X Feng, Q Li, K Sun, Z Qian, G Zhao, X Kuang… - 31st USENIX Security …, 2022 - usenix.org
ICMP redirect is a mechanism that allows an end host to dynamically update its routing
decisions for particular destinations. Previous studies show that ICMP redirect may be …

Enabling efficient source and path verification via probabilistic packet marking

B Wu, K Xu, Q Li, Z Liu, YC Hu, MJ Reed… - 2018 IEEE/ACM 26th …, 2018 - ieeexplore.ieee.org
The Internet lacks verification of source authenticity and path compliance between the
planned packet delivery paths and the real delivery paths, which allows attackers to …

A security enforcement framework for SDN controller using game theoretic approach

M Priyadarsini, P Bera, SK Das… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Software-defined networking (SDN) has gained significant attention as the future
deployment platform for the Internet and enterprise networks. The major advantages of SDN …