Defense against packet collusion attacks in opportunistic networks.
Majeed AlajeelyRobin DossAsma'a AhmadVicky H. Mak-HauPublished in: Comput. Secur. (2017)
Keyphrases
- internet traffic
- ddos attacks
- traffic analysis
- defense mechanisms
- stepping stones
- intrusion detection
- internet protocol
- network security
- social networks
- network layer
- countermeasures
- switched networks
- network topologies
- network design
- buffer size
- differentiated services
- normal traffic
- network structure
- computer virus