PINT: Probabilistic in-band network telemetry

R Ben Basat, S Ramanathan, Y Li, G Antichi… - Proceedings of the …, 2020 - dl.acm.org
Commodity network devices support adding in-band telemetry measurements into data
packets, enabling a wide range of applications, including network troubleshooting …

A systematic review of IP traceback schemes for denial of service attacks

K Singh, P Singh, K Kumar - Computers & Security, 2016 - Elsevier
Internet has always been vulnerable to a variety of security threats as it was originally
designed without apprehending the prospect of security concerns. Modern era has seen …

Security against passive attacks on network coding system–a survey

Y Liu, Y Morgan - Computer networks, 2018 - Elsevier
Network coding is a progressive information dissemination technology for network
communications. Since its emergence at the turn of the millennium, network coding has …

A practical approach for provenance transmission in wireless sensor networks

SMI Alam, S Fahmy - Ad Hoc Networks, 2014 - Elsevier
Assessing the trustworthiness of sensor data and transmitters of this data is critical for quality
assurance. Trust evaluation frameworks utilize data provenance along with the sensed data …

[PDF][PDF] LDDoS Attack Detection by Using Ant Colony Optimization Algorithms.

HH Chen, SK Huang - J. Inf. Sci. Eng., 2016 - academia.edu
Internet service providers and equipment vendors are subject to cyber threats. One of the
most prevalent security threats is a distributed denial of service (DDoS) attack. In a DDoS …

LPM: A lightweight authenticated packet marking approach for IP traceback

H Patel, DC Jinwala - Computer Networks, 2018 - Elsevier
IP traceback approaches have an important role to play in mitigating the attacks based on IP
spoofing like Denial of service/Distributed denial of service attacks. Due to the obvious …

[PDF][PDF] A precise and practical IP traceback technique based on packet marking and logging

D Yan, Y Wang, S Su, F Yang - Journal of Information Science and …, 2012 - Citeseer
Tracing malicious packets back to their source is important to defend the Internet against
Denial of Service (DoS) intrusion. IP traceback is just the technique to realize the goal, it …

Energy-efficient provenance transmission in large-scale wireless sensor networks

SMI Alam, S Fahmy - 2011 IEEE International Symposium on a …, 2011 - ieeexplore.ieee.org
Large-scale sensor-based decision support systems are being widely deployed. Assessing
the trustworthiness of sensor data and the owners of this data is critical for quality assurance …

Pollution attacks and defenses in wireless interflow network coding systems

J Dong, R Curtmola, C Nita-Rotaru… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We study data pollution attacks in wireless interflow network coding systems. Although
several defenses for these attacks are known for intraflow network coding systems, none of …

Uniform dos traceback

MN Alenezi, MJ Reed - Computers & security, 2014 - Elsevier
Denial of service (DoS) is a significant security challenge in the Internet. Identifying the
attackers so that their attack traffic can be blocked at source is one strategy that can be used …