The crossfire attack

MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …

Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses

F Al-Haidari, MH Sqalli, K Salah - 2012 IEEE 11th international …, 2012 - ieeexplore.ieee.org
Cloud computing has become one of the fastest growing segments in IT industry. A cloud
introduces resource-rich computing platforms, where adopters are charged based on the …

Predicting and tracking internet path changes

Í Cunha, R Teixeira, D Veitch, C Diot - Proceedings of the ACM …, 2011 - dl.acm.org
This paper investigates to what extent it is possible to use traceroute-style probing for
accurately tracking Internet path changes. When the number of paths is large, the usual …

Leveraging internet background radiation for opportunistic network analysis

K Benson, A Dainotti, K Claffy, AC Snoeren… - Proceedings of the …, 2015 - dl.acm.org
For more than a decade, unsolicited traffic sent to unused regions of the address space has
provided valuable insight into malicious Internet activities. In this paper, we explore the utility …

Path persistence in the cloud: A study of the effects of inter-region traffic engineering in a large cloud provider's network

W Reda, K Bogdanov, A Milolidakis… - ACM SIGCOMM …, 2020 - dl.acm.org
A commonly held belief is that traffic engineering and routing changes are infrequent.
However, based on our measurements over a number of years of traffic between data …

Bgp-multipath routing in the internet

J Li, V Giotsas, Y Wang, S Zhou - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
BGP-Multipath (BGP-M) is a multipath routing technique for load balancing. Distinct from
other techniques deployed at a router inside an Autonomous System (AS), BGP-M is …

CryptoScan: A secured scan chain architecture

D Mukhopadhyay, S Banerjee… - 14th Asian Test …, 2005 - ieeexplore.ieee.org
Scan based testing is a powerful and popular test technique. However the scan chain can
be used by an attacker to decipher the cryptogram. The present paper shows such a side …

Secure and scalable fault localization under dynamic traffic patterns

X Zhang, C Lan, A Perrig - 2012 IEEE Symposium on Security …, 2012 - ieeexplore.ieee.org
Compromised and misconfigured routers are a well-known problem in ISP and enterprise
networks. Data-plane fault localization (FL) aims to identify faulty links of compromised and …