April 12, 2023, 1:10 a.m. | Dina Barak-Pelleg, Daniel Berend

cs.CR updates on arXiv.org arxiv.org

Despite their frequency, denial-of-service (DoS\blfootnote{Denial of Service
(DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking
(PPM), coupon collector's problem (CCP)}) and distributed-denial-of-service
(DDoS) attacks are difficult to prevent and trace, thus posing a constant
threat. One of the main defense techniques is to identify the source of attack
by reconstructing the attack graph, and then filter the messages arriving from
this source. One of the most common methods for reconstructing the attack graph
is Probabilistic Packet Marking (PPM). We …

attack attacks ccp ddos ddos attacks defense denial of service distributed distributed denial of service dos edge filter focus identify main math messages packet problem service techniques threat trace

Incident Response Lead

@ Blue Yonder | Hyderabad

GRC Analyst

@ Chubb | Malaysia

Information Security Manager

@ Walbec Group | Waukesha, WI, United States

Senior Executive / Manager, Security Ops (TSSQ)

@ SMRT Corporation Ltd | Singapore, SG

Senior Engineer, Cybersecurity

@ Sonova Group | Valencia (CA), United States

Consultant (Multiple Positions Available)

@ Atos | Plano, TX, US, 75093