[PDF][PDF] Attack Intention Recognition: A Review.

AA Ahmed, NAK Zaman - Int. J. Netw. Secur., 2017 - academia.edu
Sensitive information faces critical risks when it is transmitted through computer networks.
Existing protection systems are still limited in their capacities to ensure network information …

SD-WAN Flood Tracer: Tracking the entry points of DDoS attack flows in WAN

N Dayal, S Srivastava - Computer Networks, 2021 - Elsevier
Countering DDoS attacks in the network requires identification of attack flows and their
removal, resulting in the removal of legitimate flows as well. Mitigation of attacks near the …

LPM: A lightweight authenticated packet marking approach for IP traceback

H Patel, DC Jinwala - Computer Networks, 2018 - Elsevier
IP traceback approaches have an important role to play in mitigating the attacks based on IP
spoofing like Denial of service/Distributed denial of service attacks. Due to the obvious …

The time for reconstructing the attack graph in DDoS attacks

D Barak-Pelleg, D Berend - Journal of Mathematical Analysis and …, 2024 - Elsevier
Despite their frequency, denial-of-service (DoS 5) and distributed-denial-of-service (DDoS)
attacks are difficult to prevent and trace, thus posing a constant threat. One of the main …

Algorithms for reconstructing DDoS attack graphs using probabilistic packet marking

D Barak-Pelleg, D Berend, TJ Robinson… - arXiv preprint arXiv …, 2023 - arxiv.org
DoS and DDoS attacks are widely used and pose a constant threat. Here we explore
Probability Packet Marking (PPM), one of the important methods for reconstructing the attack …

Simulating a coupon collector

D Barak-Pelleg, D Berend - … on Cyber Security, Cryptology, and Machine …, 2022 - Springer
The coupon collector's problem (CCP) reads as follows: How many drawings are needed on
average in order to complete a collection of n types of coupons, if at each step a single …

Forensic investigation-based framework for SDN using blockchain

S Bhardwaj, R Swami, M Dave - Revolutionary applications of …, 2021 - igi-global.com
Software-defined networking (SDN) is a promising networking technology that provides a
new way of network management to the customers. SDN provides more programmable and …

Efficient method for discriminating flash event from DoS attack during internet protocol traceback using shark smell optimization algorithm

OW Salami, IJ Umoh, EA Adedokun… - … Conference of the …, 2019 - ieeexplore.ieee.org
Internet Protocol (IP) traceback tool can wrongly identify a Flash event (FE) flow as a Denial
of Service (DoS) attack when tracing a DoS attack source because of the symptomatic …

[PDF][PDF] Implementing flash event discrimination in IP traceback using shark smell optimisation algorithm

OW Salami, IJ Umoh… - Kinetik: Game …, 2019 - download.garuda.kemdikbud.go.id
Denial of service attack and its variants are the largest ravaging network problems. They are
used to cause damage to network by disrupting its services in order to harm a business or …

Fast Simulations of the Multi-Album Collector

D Barak-Pelleg, D Berend - 2024 - researchsquare.com
Our starting point is the coupon collector's problem. In this problem, there are $ n $ coupons
that are drawn uniformly randomly with replacement. The question is how many drawings on …