Detection of economic denial of sustainability (EDoS) threats in self-organizing networks

MAS Monge, JM Vidal, GM Pérez - Computer Communications, 2019 - Elsevier
This paper reviews the threat of economic denial of sustainability on recent communication
networks and discusses their adaptation to emergent scenarios suited for self-organization …

Adaptive artificial immune networks for mitigating DoS flooding attacks

JM Vidal, ALS Orozco, LJG Villalba - Swarm and Evolutionary Computation, 2018 - Elsevier
Denial of service attacks pose a threat in constant growth. This is mainly due to their
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …

[HTML][HTML] Network forensic investigation protocol to identify true origin of cyber crime

RY Patil, SR Devane - Journal of King Saud University-Computer and …, 2022 - Elsevier
An increase in digitization is giving rise to cybercrimes. The existing network protocols are
insufficient for collecting the required digital evidence of cybercrime, which eventually makes …

Traffic-flow analysis for source-side DDoS recognition on 5G environments

MAS Monge, AH González, BL Fernández… - Journal of Network and …, 2019 - Elsevier
This paper introduces a novel approach for detecting the participation of a protected network
device in flooding-based Distributed Denial of Service attacks. With this purpose, the traffic …

Enabling efficient source and path verification via probabilistic packet marking

B Wu, K Xu, Q Li, Z Liu, YC Hu, MJ Reed… - 2018 IEEE/ACM 26th …, 2018 - ieeexplore.ieee.org
The Internet lacks verification of source authenticity and path compliance between the
planned packet delivery paths and the real delivery paths, which allows attackers to …

Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments

JM Vidal, MAS Monge, LJG Villalba - Proceedings of the 13th …, 2018 - dl.acm.org
This paper reviews the Economic Denial of Sustainability (EDoS) problem in emerging
network scenarios. The performed research studied them in context of adaptive approaches …

Unmasking of source identity, a step beyond in cyber forensic

RY Patil, SR Devane - Proceedings of the 10th international conference …, 2017 - dl.acm.org
Increasing number of digital crime raises the need of investigation where the most critical
step is to collect the evidences of attack and find the real origin of the attack. However the …

Entropy-based economic denial of sustainability detection

In recent years, an important increase in the amount and impact of Distributed Denial of
Service (DDoS) threats has been reported by the different information security organizations …

Towards incidence management in 5G based on situational awareness

LI Barona Lopez, AL Valdivieso Caraguay… - Future Internet, 2017 - mdpi.com
The fifth generation mobile network, or 5G, moves towards bringing solutions to deploying
faster networks, with hundreds of thousands of simultaneous connections and massive data …

A novel topology link-controlling approach for active defense of nodes in networks

J Li, HP Hu, Q Ke, N Xiong - Sensors, 2017 - mdpi.com
With the rapid development of virtual machine technology and cloud computing, distributed
denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of …