Detecting tunneled flooding traffic via deep semantic analysis of packet length patterns

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Distributed denial-of-service (DDoS) protection services capture various flooding attacks by
analyzing traffic features. However, existing services are unable to accurately detect …

Leveraging prefix structure to detect volumetric ddos attack signatures with programmable switches

C Misa, R Durairajan, A Gupta… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
As increasingly complex and dynamic volumetric DDoS attacks continue to wreak havoc on
edge networks, two recent developments promise to bolster DDoS defense at the edge …

[PDF][PDF] LoRDMA: A New Low-Rate DoS Attack in RDMA Networks

S Wang, M Zhang, Y Du, Z Chen, Z Wang, M Xu… - NDSS …, 2024 - ndss-symposium.org
RDMA is being widely used from private data center applications to multi-tenant clouds,
which makes RDMA security gain tremendous attention. However, existing RDMA security …

[PDF][PDF] SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes

S Yoo, X Chen, J Rexford - USENIX Security, 2024 - usenix.org
Despite decades of mitigation efforts, SYN flooding attacks continue to increase in frequency
and scale, and adaptive adversaries continue to evolve. Meanwhile, volumes of benign …

Enhancing Network Attack Detection with Distributed and {In-Network} Data Collection System

SMM Mirnajafizadeh, AR Sethuram… - 33rd USENIX Security …, 2024 - usenix.org
The collection of network data poses a significant challenge for machine/deep learning-
driven network defense systems. This paper proposes a new paradigm, namely In-network …

Collaborative defense against hybrid network attacks by SDN controllers and P4 switches

YC Wang, PY Su - IEEE Transactions on Network Science and …, 2023 - ieeexplore.ieee.org
Software-defined networking (SDN) uses a controller to manage the network. Applying SDN
to resist distributed denial-of-service flood (DDoS-F) attacks receives attention. A controller …

SatShield: In-Network Mitigation of Link Flooding Attacks for LEO Constellation Networks

W Jiang, H Jiang, Y Xie, J Wu, X He… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Low Earth Orbit (LEO) satellite networks provide global connectivity but are vulnerable to
security threats such as link flooding attacks. To defend against such attacks, stateof-the-art …

In-Network DDoS Mitigation Mechanism for Vehicle Road Cooperation Network With Victim-Centric Approach

Y Liu, S Shao, S Guo, Z Zang… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
Vehicle Road Cooperation (VRC) services closely related to personal safety impose
stringent requirements on reliability and real-time performance. However, the growing trend …

Defending Against Link-Flooding Attacks With Adversary Interest Prediction and Grouped Online Load Balancing

Z Huang, X Huang, K Xue, J Han… - IEEE Transactions …, 2025 - ieeexplore.ieee.org
A Link Flooding Attack (LFA) is a type of link-aimed Distributed Denial of Service (DDoS)
attack that can overwhelm the Internet critical links to cut off connections with lots of low-rate …

SpiderNet: Enabling Bot Identification in Network Topology Obfuscation Against Link Flooding Attacks

X Huang, K Xue, Z Huang, J Han… - IEEE/ACM …, 2024 - ieeexplore.ieee.org
Link-flooding attacks (LFAs) pose a significant challenge to Internet availability by attacking
critical network links with high volumes of seemingly legitimate traffic. In response …