Detecting Fake Deposit Attacks on Cross-chain Bridges from a Network Perspective.
Kaixin LinDan LinZiye ZhengYixiang TanJiajing WuPublished in: ISCAS (2024)
Keyphrases
- traffic analysis
- network intrusion
- network intrusion detection systems
- security threats
- wireless sensor networks
- peer to peer
- intrusion detection
- network structure
- network traffic
- computer networks
- network model
- fault injection
- denial of service attacks
- intrusion detection and prevention
- viewpoint
- network attacks
- malicious attacks
- network intrusion detection
- network anomaly detection
- network configuration
- insider threat
- security risks
- network administrators
- buffer overflow
- network management
- shortest path