The Maestro Attack: Orchestrating Malicious Flows with BGP.
Tyler McDanielJared M. SmithMax SchuchardPublished in: SecureComm (1) (2020)
Keyphrases
- malicious users
- malicious attacks
- normal traffic
- anomaly detection
- detecting malicious
- malicious activities
- detect malicious
- malicious behavior
- insider attacks
- computer viruses
- attack detection
- traffic patterns
- network traffic
- malicious nodes
- countermeasures
- normal behavior
- key exchange protocol
- secret key
- online social networks