An Inter-Domain Attack Mitigating Solution

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling and Mitigating the Coremelt Attack

This paper studies the Coremelt attack, a linkflooding Distributed Denial of Service attack that exhausts the bandwidth at a core network link using low-intensity traffics between subverted sources. A dynamical system model is formulated for analyzing the effect of the Coremelt attack on a single-link Transmission Control Protocol (TCP) network. Stability and convergence of the source flow rate...

متن کامل

Mitigating SAT Attack on Logic Locking

Logic locking is a technique that has been proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct key is provided. Recently, the security of logic locking is threatened by a new attack called SAT attack, which can decipher the correct key of most logic locking techniques within a few ho...

متن کامل

Mitigating Technique to Overcome DDOS Attack

Mitigating Technique to Overcome DDOS Attack V.PRAVEENA Department of Computer Science and Engineering Dr.N.G.P. Insttitute of Technology Kalapatti road, Coimbatore641 048. Tamilnadu. India [email protected] _________________________________________________________________________________________ Abstract: In this paper, we explore a new scheme for filtering spoofed packets (DDOS attack) w...

متن کامل

Mitigating Inter-network Interference in LoRa Networks

Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and th...

متن کامل

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES

سال: 2020

ISSN: 1303-6203

DOI: 10.3906/elk-1904-179