2017 23rd Asia-Pacific Conference on Communications (APCC) 2017
DOI: 10.23919/apcc.2017.8304023
|View full text |Cite
|
Sign up to set email alerts
|

Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…In this section, we investigate the effects of some important parameters and our observations; we compare the performance of our methods with LFAD [ 1 ] with the performance of mitigation accuracy MA t . Notably, there are eight previous works that concern defense against LFA for both detection and mitigation [ 1 , 4 , 5 , 8 , 10 , 11 , 12 , 13 ], while others [ 3 , 6 , 7 , 9 ] only deal with detection. Overall, the study of [ 1 ] performs best in terms of defending against LFA with SDN among the eight previous works cited.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section, we investigate the effects of some important parameters and our observations; we compare the performance of our methods with LFAD [ 1 ] with the performance of mitigation accuracy MA t . Notably, there are eight previous works that concern defense against LFA for both detection and mitigation [ 1 , 4 , 5 , 8 , 10 , 11 , 12 , 13 ], while others [ 3 , 6 , 7 , 9 ] only deal with detection. Overall, the study of [ 1 ] performs best in terms of defending against LFA with SDN among the eight previous works cited.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, many traceroute packets will be generated before launching the attacks, so the category of traceroute packet monitoring observes the growth of the traceroute packets. In [ 9 ], the authors propose an attack detection scheme that analyzes hop count to the destination to detect LFA. Compared with legitimate users’ destination of traffic distributed evenly, the destination of traceroute, which is caused by the adversary’s reconnoitering topology near the target region before the attack, aggregates within several hops from the target link.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations