Author:
Zhou Boyang,Pan Gaoning,Wu Chunming,Zhu Kai,Ruan Wei
Publisher
Springer Science and Business Media LLC
Reference9 articles.
1. Kang M S, Lee S B, Gligor V D. The crossfire attack. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2013. 127–141
2. Venkatesan S, Albanese M, Amin K, et al. A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. In: Proceedings of IEEE Conference on Communications and Network Security (CNS), Philadelphia, 2016. 198–206
3. Wang J, Wen R, Li J Q, et al. Detecting and mitigating target link-flooding attacks using SDN. IEEE Trans Depend Secure Comput, 2019, 16: 944–956
4. Zheng J, Li Q, Gu G, et al. Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis. IEEE Trans Inform Forensic Secur, 2018, 13: 1838–1853
5. Hu H, Wu J, Wang Z, et al. Mimic defense: a designed- in cybersecurity defense framework. IET Info Secur, 2018, 12: 226–237
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Crossfire Attack Defense Method Based on Virtual Topology;2023 19th International Conference on Mobility, Sensing and Networking (MSN);2023-12-14
2. A Virtual Network Topology Spoofing Defense Method Based On DCGAN;2023 9th International Conference on Computer and Communications (ICCC);2023-12-08
3. Security-oriented Deception on Network Topology against Crossfire Attack;2023 4th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC);2023-08-18
4. A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack;Security and Communication Networks;2022-12-31