Login / Signup
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification.
Liang Xie
Sencun Zhu
Published in:
SecureComm (2006)
Keyphrases
</>
attack detection
attack scenarios
overlay network
multistage
structured peer to peer
intrusion detection system
peer to peer
network topology
publish subscribe
cyber attacks
bandwidth consumption
product recommendation
information systems
intrusion detection
countermeasures
end to end
state space
data mining