Defending Against Contagious Attacks on a Network with Resource Reallocation.
Rufan BaiHaoxing LinXinyu YangXiaowei WuMinming LiWeijia JiaPublished in: CoRR (2020)
Keyphrases
- ddos attacks
- traffic analysis
- denial of service attacks
- network resources
- network anomaly detection
- network structure
- network model
- computer networks
- network management
- network traffic
- peer to peer
- complex networks
- buffer overflow
- security threats
- resource constraints
- security measures
- intrusion detection and prevention
- security risks
- social networks
- watermarking scheme
- resource allocation
- digital images
- bayesian networks