Detecting tunneled flooding traffic via deep semantic analysis of packet length patterns

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Distributed denial-of-service (DDoS) protection services capture various flooding attacks by
analyzing traffic features. However, existing services are unable to accurately detect …

Unveiling the Bandwidth Nightmare: CDN Compression Format Conversion Attacks

Z Lin, Z Lin, X Liu, Z Ying… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Content Delivery Networks (CDNs) are designed to enhance network performance and
protect against web attack traffic for their hosting websites. And the HTTP compression …

[PDF][PDF] REQSMINER: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing

L Zheng, X Li, C Wang, R Guo, H Duan, J Chen… - researchgate.net
Content Delivery Networks (CDNs) are ubiquitous middleboxes designed to enhance the
performance of hosted websites and shield them from various attacks. Numerous notable …

[PDF][PDF] A Large-Scale Measurement Study of the PROXY Protocol and its Security Implications

S Pletinckx, C Kruegel, G Vigna - spletinckx.github.io
Reverse proxy servers play a critical role in optimizing Internet services, offering benefits
ranging from load balancing to Denial of Service (DoS) protection. A known shortcoming of …

Double-edged sword: DoS attacks using CDN

S Yeleuov, JLM Navarro, T Aura - haic.fi
• Among four tested CDN providers one was susceptible for Convex Attack and two for Pre-
Post Slow attack. Remaining CDN provider does not support POST requests and …