Detection and characterization of network anomalies in large-scale RTT time series

B Hou, C Hou, T Zhou, Z Cai… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Network anomalies, such as wide-area congestion and packet loss, can seriously degrade
network performance. To this end, it is critical to accurately identify network anomalies on …

Record route IP traceback: Combating DoS attacks and the variants

AY Nur, ME Tozal - Computers & Security, 2018 - Elsevier
The Internet introduces a variety of vulnerabilities that put the security and privacy of
computer based systems under risk. One of the most perilous threats in the Internet is the …

Towards detecting target link flooding attack

L Xue, X Luo, EWW Chan, X Zhan - 28th Large Installation System …, 2014 - usenix.org
A new class of target link flooding attacks (LFA) can cut off the Internet connections of a
target area without being detected because they employ legitimate flows to congest selected …

Randomized security patrolling for link flooding attack detection

X Ma, B An, M Zhao, X Luo, L Xue, Z Li… - … on Dependable and …, 2019 - ieeexplore.ieee.org
With the advancement of large-scale coordinated attacks, the adversary is shifting away from
traditional distributed denial of service (DDoS) attacks against servers to sophisticated …

Software-defined network support for transport resilience

JT Araújo, R Landa, RG Clegg… - 2014 IEEE Network …, 2014 - ieeexplore.ieee.org
Existing methods for traffic resilience at the network and transport layers typically work in
isolation, often resorting to inference in fault detection and recovery respectively. This both …

Method for estimating locations of service problem causes in service function chaining

A Oi, D Endou, T Moriya… - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
We propose a method for estimating the locations of the causes of failure or deterioration in
quality in the service function chains (SFCs) of datacenter networks by using tests packets …

[Retracted] On the Modeling of RTT Time Series for Network Anomaly Detection

Y Kuang, D Li, X Huang, M Zhou - Security and Communication …, 2022 - Wiley Online Library
Network anomalies can seriously influence the performance of networks and cause huge
financial losses. Existing studies modeled the round‐trip time (RTT) time series of each link …

Network anomaly detection and localization

JQ Wei, QL Zhang, X Li - 2016 13th International Computer …, 2016 - ieeexplore.ieee.org
With the increasing scale and complexity of the network, how to maintain a level of network
performance and robustness for network operators to satisfy customers becomes more and …

Towards internet-scale convolutional root-cause analysis with diagnet

L Bonniot, C Neumann, F Taïani - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Diagnosing problems in Internet-scale services remains particularly difficult and costly for
both content providers and ISPs. Because the Internet is decentralized, the cause of such …

[HTML][HTML] Active Intrusion Detection for Wireless Multihop Networks

RD do Carmo - 2014 - tuprints.ulb.tu-darmstadt.de
This work focuses on network security and introduces an active-probing technique for
intrusion detection in wireless multihop networks. Wireless networks have been the …