Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV.
Abdullah AydegerNico SaputroKemal AkkayaPublished in: LCN (2020)
Keyphrases
- traffic analysis
- security threats
- network anomaly detection
- network intrusion
- computer networks
- cloud computing
- network attacks
- ddos attacks
- countermeasures
- network model
- communication networks
- network intrusion detection
- security risks
- fault injection
- peer to peer
- denial of service attacks
- insider threat
- intrusion detection
- buffer overflow
- intrusion prevention
- intrusion detection and prevention