On the Feasibility of Rerouting-Based DDoS Defenses.
Muoi TranMin Suk KangHsu-Chun HsiaoWei-Hsuan ChiangShu-Po TungYu-Su WangPublished in: IEEE Symposium on Security and Privacy (2019)
Keyphrases
- denial of service attacks
- ddos attacks
- intrusion detection system
- network layer
- reinforcement learning
- lightweight
- practical application
- network security
- genetic algorithm
- metadata
- search algorithm
- lower bound
- data mining
- computer networks
- resource management
- information systems
- dos attacks
- artificial intelligence
- machine learning systems