The Maestro Attack: Orchestrating Malicious Flows with BGP.
Tyler McDanielJared M. SmithMax SchuchardPublished in: CoRR (2019)
Keyphrases
- malicious users
- malicious attacks
- normal traffic
- anomaly detection
- detecting malicious
- malicious activities
- detect malicious
- malicious nodes
- countermeasures
- malicious behavior
- network traffic
- secret key
- computer viruses
- intrusion detection
- identity theft
- malicious code
- data corruption
- intrusion detection system
- web pages