Pervasive Computing: A Networking Perspective and Future Directions 2019
DOI: 10.1007/978-981-13-3462-7_2
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Agent-Based Detection and Prevention of DDoS Attacks in Distributed P2P Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…As stated above, in this paper we do not consider direct threat to the whole P2P communication channel and, therefore, we do not deal with this aspect. However, as stated above, the recent scientific literature report several solutions to DoS attacks [61]- [63]. Any of them could be integrated in our approach, thus making it robust also to full DoS attacks.…”
Section: Sp2 -Resistance To Package Correlation Attacksmentioning
confidence: 91%
See 1 more Smart Citation
“…As stated above, in this paper we do not consider direct threat to the whole P2P communication channel and, therefore, we do not deal with this aspect. However, as stated above, the recent scientific literature report several solutions to DoS attacks [61]- [63]. Any of them could be integrated in our approach, thus making it robust also to full DoS attacks.…”
Section: Sp2 -Resistance To Package Correlation Attacksmentioning
confidence: 91%
“…In addition, our approach focuses on the protection against privacy leakages deriving from the availability of access log information from a video surveillance based access monitoring system, therefore we do not consider direct threats to the P2P communication channel, such as DoS attacks [60]. Anyway, these menaces are thoroughly studied in the scientific literature and, therefore, even if the identification of suitable strategies for the protection from them is orthogonal to our solution, it is possible to leverage any available solution already proposed in the literature to make our approach robust also against these kinds of attack [61]- [63].…”
Section: A Attack Modelmentioning
confidence: 99%
“…e IP segment was 192.168.6.0/24, and the computers were connected to Port2 of the Router via Switch2 [30].…”
Section: Experimental Environment Setupmentioning
confidence: 99%
“…erefore, the CMCNN-based detection method can effectively conduct multiclass detection of massive DDoS- attack traffic on the blockchain network layer and can also discriminate specific types of attack traffic. Finally, the multiclass detection performances of CMCNN and the existing methods on the blockchain network layer were compared using the model data and methods proposed in the literature [30,31]. e results are shown in Figure 11.…”
Section: Multiclass Detection Performance Of Models Undermentioning
confidence: 99%