Assessing NFV Network Recovery Strategies after Random Failures and Targeted Attacks.
Trond VattenYuming JiangPoul E. HeegaardPublished in: RNDM (2023)
Keyphrases
- traffic analysis
- network attacks
- network anomaly detection
- peer to peer
- security threats
- chosen plaintext
- countermeasures
- network management
- network traffic
- complex networks
- computer networks
- failure recovery
- buffer overflow
- neural network
- ddos attacks
- failure detection
- disaster recovery
- intrusion prevention
- social networks
- network structure
- fault injection
- network intrusion
- link failure
- network model