all InfoSec news
The Time for Reconstructing the Attack Graph in DDoS Attacks. (arXiv:2304.05204v1 [math.PR])
cs.CR updates on arXiv.org arxiv.org
Despite their frequency, denial-of-service (DoS\blfootnote{Denial of Service
(DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking
(PPM), coupon collector's problem (CCP)}) and distributed-denial-of-service
(DDoS) attacks are difficult to prevent and trace, thus posing a constant
threat. One of the main defense techniques is to identify the source of attack
by reconstructing the attack graph, and then filter the messages arriving from
this source. One of the most common methods for reconstructing the attack graph
is Probabilistic Packet Marking (PPM). We …
attack attacks ccp ddos ddos attacks defense denial of service distributed distributed denial of service dos edge filter focus identify main math messages packet problem service techniques threat trace