April 12, 2023, 1:10 a.m. | Dina Barak-Pelleg, Daniel Berend

cs.CR updates on arXiv.org arxiv.org

Despite their frequency, denial-of-service (DoS\blfootnote{Denial of Service
(DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking
(PPM), coupon collector's problem (CCP)}) and distributed-denial-of-service
(DDoS) attacks are difficult to prevent and trace, thus posing a constant
threat. One of the main defense techniques is to identify the source of attack
by reconstructing the attack graph, and then filter the messages arriving from
this source. One of the most common methods for reconstructing the attack graph
is Probabilistic Packet Marking (PPM). We …

attack attacks ccp ddos ddos attacks defense denial of service distributed distributed denial of service dos edge filter focus identify main math messages packet problem service techniques threat trace

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC