Risk taxonomy, mitigation, and assessment benchmarks of large language model systems

T Cui, Y Wang, C Fu, Y **ao, S Li, X Deng, Y Liu… - arxiv preprint arxiv …, 2024 - arxiv.org
Large language models (LLMs) have strong capabilities in solving diverse natural language
processing tasks. However, the safety and security issues of LLM systems have become the …

Aggregate-based congestion control for pulse-wave DDoS defense

AG Alcoz, M Strohmeier, V Lenders… - Proceedings of the ACM …, 2022 - dl.acm.org
Pulse-wave DDoS attacks are a new type of volumetric attack formed by short, high-rate
traffic pulses. Such attacks target the Achilles' heel of state-of-the-art DDoS defenses: their …

A stealthier partitioning attack against bitcoin peer-to-peer network

M Tran, I Choi, GJ Moon, AV Vu… - 2020 IEEE symposium …, 2020 - ieeexplore.ieee.org
Network adversaries, such as malicious transit autonomous systems (ASes), have been
shown to be capable of partitioning the Bitcoin's peer-to-peer network via routing-level …

An empirical study of consensus protocols' dos resilience

G Giuliari, A Sonnino, M Frei, F Streun… - Proceedings of the 19th …, 2024 - dl.acm.org
With the proliferation of blockchain technology in high-value sectors, consensus protocols
are becoming critical infrastructures. The rapid innovation cycle in Byzantine fault tolerant …

Detecting tunneled flooding traffic via deep semantic analysis of packet length patterns

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Distributed denial-of-service (DDoS) protection services capture various flooding attacks by
analyzing traffic features. However, existing services are unable to accurately detect …

Toposcope: Recover as relationships from fragmentary observations

Z **, X Shi, Y Yang, X Yin, Z Wang, J Wu - Proceedings of the ACM …, 2020 - dl.acm.org
Knowledge of the Internet topology and the business relationships between Autonomous
Systems (ASes) is the basis for studying many aspects of the Internet. Despite the significant …

Differential pricing strategies for bandwidth allocation with LFA resilience: A stackelberg game approach

L **e, S Meng, W Yao, X Zhang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Link flooding attacks (LFAs) have always been a security concern as the impact of
volumetric attacks on transit links are increasingly severe. Capacity expansion, while being …

Colibri: a cooperative lightweight inter-domain bandwidth-reservation infrastructure

G Giuliari, D Roos, M Wyss, JA García-Pardo… - Proceedings of the 17th …, 2021 - dl.acm.org
Guarantees for traffic traversing the public Internet are hard to come by, as service-level
agreements are typically only available for traffic within a single autonomous system or …

Off-path TCP hijacking attacks via the side channel of downgraded IPID

X Feng, Q Li, K Sun, C Fu, K Xu - IEEE/ACM transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we uncover a new off-path TCP hijacking attack that can be used to terminate
victim TCP connections or inject forged data into victim TCP connections by manipulating …

Rl-shield: mitigating target link-flooding attacks using sdn and deep reinforcement learning routing algorithm

A Rezapour, WG Tzeng - IEEE Transactions on Dependable …, 2021 - ieeexplore.ieee.org
Link-flooding attacks (LFAs) are a new type of distributed denial-of-service (DDoS) attacks
that can substantially damage network connectivity. LFAs flows are seemingly legitimate at …