Network fingerprinting via timing attacks and defense in software defined networks.
Beytüllah YigitGürkan GürFatih AlagözBernhard TellenbachPublished in: Comput. Networks (2023)
Keyphrases
- network structure
- ddos attacks
- computer networks
- network topologies
- complex networks
- network design
- traffic analysis
- network parameters
- network size
- community structure
- network security
- network model
- counter propagation
- heterogeneous networks
- cellular networks
- transport network
- network nodes
- fully connected
- scale free
- security risks
- computer systems
- social networks
- connectionist networks
- recurrent networks
- network resources
- network attacks
- communication networks
- network traffic
- access points
- telecommunication networks
- real world networks
- small world
- network services
- intrusion detection
- software development
- denial of service attacks
- network analysis
- citation networks
- functional units
- end hosts
- security threats
- copyright protection
- mobile nodes
- information diffusion
- network management
- watermarking scheme
- source code