2011
DOI: 10.21236/ada582042
|View full text |Cite
|
Sign up to set email alerts
|

FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks

Abstract: Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and R… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
0
0
0
Order By: Relevance
“…To defend against LFAs, the first step is to collect data from the network and identify suspicious traffic [10]- [17]. Most existing solutions deploy the defense system on centralized servers, which request network statistics from the data plane (i.e., forwarding devices).…”
Section: Introductionmentioning
confidence: 99%
“…To defend against LFAs, the first step is to collect data from the network and identify suspicious traffic [10]- [17]. Most existing solutions deploy the defense system on centralized servers, which request network statistics from the data plane (i.e., forwarding devices).…”
Section: Introductionmentioning
confidence: 99%