Permutation Network De-obfuscation: A Delay-based Attack and Countermeasure Investigation.
Zimu GuoSreeja ChowdhuryMark M. TehranipoorDomenic FortePublished in: ACM J. Emerg. Technol. Comput. Syst. (2020)
Keyphrases
- countermeasures
- attack graphs
- network traffic
- reverse engineering
- network model
- attack graph
- cyber attacks
- software engineering
- network structure
- end to end
- transmission delay
- asynchronous transfer mode
- fault injection
- transmission rate
- security risks
- congestion control
- dos attacks
- path length
- data flow
- computer networks
- information security
- complex networks
- peer to peer