Quantifying autonomous system IP churn using attack traffic of botnets.
Harm GriffioenChristian DoerrPublished in: ARES (2020)
Keyphrases
- ddos attacks
- network traffic
- ip address
- malicious traffic
- ip addresses
- application layer
- network layer
- normal traffic
- dos attacks
- denial of service attacks
- detection mechanism
- cooperative
- intrusion detection
- traffic engineering
- network management
- denial of service
- traffic patterns
- network resources
- network security
- robotic systems
- wireless access networks
- internet protocol
- autonomous vehicles
- anomaly detection