Amplification/Reflection Attack Suppression Using Victim Separation.
Hawa Singh GurjarGaurav SomaniPublished in: IEEE Netw. Lett. (2023)
Keyphrases
- attack scenarios
- countermeasures
- attack detection
- reflection components
- decision trees
- edge detection
- attack graphs
- power analysis
- malicious users
- abstract argumentation
- specular and diffuse reflection
- data sets
- key exchange protocol
- attack graph
- authentication protocol
- smart card
- intrusion detection system
- access control
- social networks