Dollm: How large language models understanding network flow data to detect carpet bombing ddos

Q Li, Y Zhang, Z Jia, Y Hu, L Zhang, J Zhang… - arxiv preprint arxiv …, 2024 - arxiv.org
It is an interesting question Can and How Large Language Models (LLMs) understand non-
language network data, and help us detect unknown malicious flows. This paper takes …

SoK: A data-driven view on methods to detect reflective amplification DDoS attacks using honeypots

M Nawrocki, J Kristoff, R Hiesgen… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
In this paper, we revisit the use of honeypots for detecting reflective amplification attacks.
These measurement tools require careful design of both data collection and data analysis …

Transparent forwarders: an unnoticed component of the open DNS infrastructure

M Nawrocki, M Koch, TC Schmidt… - Proceedings of the 17th …, 2021 - dl.acm.org
In this paper, we revisit the open DNS (ODNS) infrastructure and, for the first time,
systematically measure and analyze transparent forwarders, DNS components that …

The age of DDoScovery: an empirical comparison of industry and academic DDoS assessments

R Hiesgen, M Nawrocki, M Barcellos, D Kopp… - Proceedings of the …, 2024 - dl.acm.org
Motivated by the impressive but diffuse scope of DDoS research and reporting, we
undertake a multistakeholder (joint industry-academic) analysis to seek convergence across …

A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection

M Lyu, HH Gharakheili, V Sivaraman - IEEE Access, 2024 - ieeexplore.ieee.org
Enterprise networks that host valuable assets and services are popular and frequent targets
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …

[HTML][HTML] A ddos tracking scheme utilizing adaptive beam search with unmanned aerial vehicles in smart grid

W Guo, Z Zhang, L Chang, Y Song, L Yin - Drones, 2024 - mdpi.com
As IoT technology advances, the smart grid (SG) has become crucial to industrial
infrastructure. However, SG faces security challenges, particularly from distributed denial of …

[HTML][HTML] Large-scale empirical evaluation of DNS and SSDP amplification attacks

M Anagnostopoulos, S Lagos… - Journal of Information …, 2022 - Elsevier
Reflection-based volumetric distributed denial-of-service (DDoS) attacks take advantage of
the available to all (open) services to flood and possibly overpower a victim's server or …

DDoS2Vec: Flow-level characterisation of volumetric DDoS attacks at scale

R Singh Samra, M Barcellos - Proceedings of the ACM on Networking, 2023 - dl.acm.org
Volumetric Distributed Denial of Service (DDoS) attacks have been a severe threat to the
Internet for more than two decades. Some success in mitigation has been achieved based …

[PDF][PDF] A Comprehensive Review of DNS-based Distributed Reflection Denial of Service (DRDoS) Attacks: State-of-the-Art

RR Nuiaa, S Manickam… - Int. J. Adv. Sci. Eng. Inf …, 2022 - researchgate.net
Cyberattacks significantly impact the services based on the internet that is used in our daily
lives. Any disruption will make it extremely difficult for us to carry out our daily activities …

Glossy Mirrors: On the Role of Open Resolvers in Reflection and Amplification DDoS Attacks

R Yazdani, M Resing, A Sperotto - 2024 20th International …, 2024 - ieeexplore.ieee.org
Open DNS resolvers are infamous contributors to DDoS attacks. Characteristics of open
DNS resolvers have been studied in different aspects in the past. However, there is a gap in …