C Misa, R Durairajan, A Gupta… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
As increasingly complex and dynamic volumetric DDoS attacks continue to wreak havoc on edge networks, two recent developments promise to bolster DDoS defense at the edge …
S Wang, M Zhang, Y Du, Z Chen, Z Wang, M Xu… - NDSS …, 2024 - ndss-symposium.org
RDMA is being widely used from private data center applications to multi-tenant clouds, which makes RDMA security gain tremendous attention. However, existing RDMA security …
Despite decades of mitigation efforts, SYN flooding attacks continue to increase in frequency and scale, and adaptive adversaries continue to evolve. Meanwhile, volumes of benign …
The collection of network data poses a significant challenge for machine/deep learning- driven network defense systems. This paper proposes a new paradigm, namely In-network …
YC Wang, PY Su - IEEE Transactions on Network Science and …, 2023 - ieeexplore.ieee.org
Software-defined networking (SDN) uses a controller to manage the network. Applying SDN to resist distributed denial-of-service flood (DDoS-F) attacks receives attention. A controller …
W Jiang, H Jiang, Y Xie, J Wu, X He… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Low Earth Orbit (LEO) satellite networks provide global connectivity but are vulnerable to security threats such as link flooding attacks. To defend against such attacks, stateof-the-art …
Y Liu, S Shao, S Guo, Z Zang… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
Vehicle Road Cooperation (VRC) services closely related to personal safety impose stringent requirements on reliability and real-time performance. However, the growing trend …
Z Huang, X Huang, K Xue, J Han… - IEEE Transactions …, 2025 - ieeexplore.ieee.org
A Link Flooding Attack (LFA) is a type of link-aimed Distributed Denial of Service (DDoS) attack that can overwhelm the Internet critical links to cut off connections with lots of low-rate …
X Huang, K Xue, Z Huang, J Han… - IEEE/ACM …, 2024 - ieeexplore.ieee.org
Link-flooding attacks (LFAs) pose a significant challenge to Internet availability by attacking critical network links with high volumes of seemingly legitimate traffic. In response …