2021
DOI: 10.1016/j.peva.2021.102236
|View full text |Cite
|
Sign up to set email alerts
|

Fundamental scaling laws of covert DDoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…The knowledge-based VQA (Visual Question Answering) module developed by Zheng et al [47] is designed to extend the versatility of knowledge-based VQA. Ramtin et al [48] analyzed the maximum damage that a DDoS attacker can make without being detected by a detection system at the network edge. They considered two classical classifiers based on hypothesis testing, whether the detector knows the distribution of attack traffic or not.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…The knowledge-based VQA (Visual Question Answering) module developed by Zheng et al [47] is designed to extend the versatility of knowledge-based VQA. Ramtin et al [48] analyzed the maximum damage that a DDoS attacker can make without being detected by a detection system at the network edge. They considered two classical classifiers based on hypothesis testing, whether the detector knows the distribution of attack traffic or not.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…One of the great advantages of data fusion is anomaly (e.g., a DDoS attack) detection. However, recently, it has been theoretically proved that the attacker is undetectable under some circumstances in the face of any anomaly detection approaches 21,22 . These novel theoretical results challenge the current anomaly and intrusion detection methods that leverage data fusion.…”
Section: Introductionmentioning
confidence: 99%