2019 7th International Symposium on Digital Forensics and Security (ISDFS) 2019
DOI: 10.1109/isdfs.2019.8757546
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Backbone Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…The tasks performed by network administrators tend to be complex and usually prone to errors, thus compromising network security. In fact, some attack techniques leveraging non-existent or bad configurations in layers 2 and 3 of the Open Systems Interconnection (OSI) model have been traditionally used by cyber adversaries [ 1 , 2 ].…”
Section: Introductionmentioning
confidence: 99%
“…The tasks performed by network administrators tend to be complex and usually prone to errors, thus compromising network security. In fact, some attack techniques leveraging non-existent or bad configurations in layers 2 and 3 of the Open Systems Interconnection (OSI) model have been traditionally used by cyber adversaries [ 1 , 2 ].…”
Section: Introductionmentioning
confidence: 99%