The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

Spook in your network: Attacking an sdn with a compromised openflow switch

M Antikainen, T Aura, M Särelä - … 2014, Tromsø, Norway, October 15-17 …, 2014 - Springer
Software defined networking (SDN) and OpenFlow as one of its key technologies have
received a lot of attention from the networking community. While SDN enables complex …

Preventing distributed denial-of-service flooding attacks with dynamic path identifiers

H Luo, Z Chen, J Li, AV Vasilakos - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In recent years, there are increasing interests in using path identifiers (PIDs) as inter-domain
routing objects. However, the PIDs used in existing approaches are static, which makes it …

Post-quantum secure private stream aggregation

D Becker, JG Merchan - US Patent 10,630,655, 2020 - Google Patents
(57) ABSTRACT A method for operating an aggregator in a private stream aggregation
(PSA) system has been developed. The method includes receiving a plurality of encrypted …

The bloom paradox: When not to use a bloom filter

O Rottenstreich, I Keslassy - IEEE/ACM Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we uncover the Bloom paradox in Bloom Filters: Sometimes, the Bloom Filter is
harmful and should not be queried. We first analyze conditions under which the Bloom …

An efficient DDoS detection with bloom filter in SDN

P Xiao, Z Li, H Qi, W Qu, H Yu - 2016 IEEE Trustcom/BigDataSE …, 2016 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are becoming one of the major threats in the
distributed data center networks which are loosely connected. Recent work has found new …

[PDF][PDF] An overview of DDoS attacks detection and prevention in the cloud

KA Fakeeh - International Journal of Applied Information Systems …, 2016 - academia.edu
Security is an illusion unless you are hacked. Attacks in the Cloud have more catastrophic
and destructive impact on the organizations than the user might expect. As attacks are …

rDBF: A r-dimensional bloom filter for massive scale membership query

R Patgiri, S Nayak, SK Borgohain - Journal of Network and Computer …, 2019 - Elsevier
Bloom Filter is a data structure for membership filtering that is deployed in various domains
to boost up the lookup performance and to lower the memory consumption. Bloom Filter has …

Lightweight DTLS implementation in CoAP-based Internet of Things

V Lakkundi, K Singh - 20th Annual International Conference on …, 2014 - ieeexplore.ieee.org
Security is emerging as a key area of focus in the Internet of Things. Lightweight
implementations of the required security features are the need of the hour considering the …

[PDF][PDF] Revisiting Private Stream Aggregation: Lattice-Based PSA.

D Becker, J Guajardo, KH Zimmermann - NDSS, 2018 - ndss-symposium.org
In this age of massive data gathering for purposes of personalization, targeted ads, etc. there
is an increased need for technology that allows for data analysis in a privacy-preserving …