Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices.
Ming-Hour YangJia-Ning LuoVijayalakshmi MurugesanS. Mercy ShaliniePublished in: IEEE Access (2020)
Keyphrases
- ddos attacks
- network model
- denial of service attacks
- network structure
- real world
- peer to peer
- network services
- dos attacks
- multi source
- attack graph
- network intrusion
- security measures
- network nodes
- single layer
- information sources
- neural network
- countermeasures
- network architecture
- multiple sources
- sensor networks
- data sources
- mobile devices
- fault injection
- attack graphs