2018 Annual American Control Conference (ACC) 2018
DOI: 10.23919/acc.2018.8431752
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Mitigating the Coremelt Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…In this section, we investigate the effects of some important parameters and our observations; we compare the performance of our methods with LFAD [ 1 ] with the performance of mitigation accuracy MA t . Notably, there are eight previous works that concern defense against LFA for both detection and mitigation [ 1 , 4 , 5 , 8 , 10 , 11 , 12 , 13 ], while others [ 3 , 6 , 7 , 9 ] only deal with detection. Overall, the study of [ 1 ] performs best in terms of defending against LFA with SDN among the eight previous works cited.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…In this section, we investigate the effects of some important parameters and our observations; we compare the performance of our methods with LFAD [ 1 ] with the performance of mitigation accuracy MA t . Notably, there are eight previous works that concern defense against LFA for both detection and mitigation [ 1 , 4 , 5 , 8 , 10 , 11 , 12 , 13 ], while others [ 3 , 6 , 7 , 9 ] only deal with detection. Overall, the study of [ 1 ] performs best in terms of defending against LFA with SDN among the eight previous works cited.…”
Section: Discussionmentioning
confidence: 99%
“…The previous work focusing on mitigating LFA can be classified into two types: traffic rerouting [ 1 , 10 ] and blacklist [ 4 , 5 , 8 , 11 , 12 , 13 ]. When LFA occurs, the target links are congested continuously.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A defense approach presented in [ 21 ] analyzes only a static case of the Coremelt network-layer attack with a fixed amount of attackers with fixed bandwidth, which we can apply against the application-layer DDoS. Moreover, it suggests dropping some packets from the most bandwidth-intensive users.…”
Section: Related Workmentioning
confidence: 99%