Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic.
Zhiyuan LiWeijia XingSamer KhamaisehDianxiang XuPublished in: IEEE Trans. Netw. Serv. Manag. (2020)
Keyphrases
- malicious activities
- traffic flows
- traffic analysis
- dos attacks
- denial of service attacks
- denial of service
- ddos attacks
- network intrusion detection systems
- network traffic
- traffic management
- real time
- detect malicious
- countermeasures
- detecting malicious
- traffic flow
- normal traffic
- road traffic
- natural images
- malicious traffic
- stepping stones
- identity theft
- watermarking scheme
- security risks
- misuse detection
- traffic control
- internet traffic
- security threats
- security protocols
- phishing attacks
- vehicular networks
- security issues