2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020
DOI: 10.1109/trustcom50675.2020.00040
|View full text |Cite
|
Sign up to set email alerts
|

Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…However, the approaches [9,10] have not mentioned the attacked link detection which is a prerequisite in performing obfuscation. In addition, the ICMP probing fow detection [5,6] Hence, the above approaches are insufcient in defending against the initial attack stage with the stealthier PR probing. Consequently, they can leave some undefended and vulnerable PRs for the adversary, which can be confrmed by the evaluation results in Section 5.6.…”
Section: Mtdmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the approaches [9,10] have not mentioned the attacked link detection which is a prerequisite in performing obfuscation. In addition, the ICMP probing fow detection [5,6] Hence, the above approaches are insufcient in defending against the initial attack stage with the stealthier PR probing. Consequently, they can leave some undefended and vulnerable PRs for the adversary, which can be confrmed by the evaluation results in Section 5.6.…”
Section: Mtdmentioning
confidence: 99%
“…First, the MTD approach may leave non-changed routes involving the PRs and cannot diverge the critical PRs [13,16,34,35]. In addition, the topology obfuscations [5,6,9,10] do not change the underlying routes and host addresses, which makes the decoys to be refooded. Second, the trafc throttling approaches are hard to detect randomized testing fooding at low rate [7,8,11,12].…”
Section: Defenses Against the Renaissance Attack Stagementioning
confidence: 99%
See 1 more Smart Citation
“…These countermeasures aim to hide potential bottleneck links and nodes while preserving the utility of path-tracing tools. However, a study [60] that after analyzing three state-of-theart proactive network obfuscation defenses: NetHide [59], Trassare et al's solution [61], and LinkBait [62] identified four common weaknesses that significantly compromise the security and utility of the exposed virtual topologies. Such instances are indicative of the fact that tackling such attacks is a multifaceted endeavor that requires very careful examination.…”
mentioning
confidence: 99%