Decoupling malicious Interests from Pending Interest Table to mitigate Interest Flooding Attacks.
Kai WangHuachun ZhouYajuan QinJia ChenHongke ZhangPublished in: GLOBECOM Workshops (2013)
Keyphrases
- malicious users
- detect malicious
- malicious attacks
- detecting malicious
- malicious behavior
- malicious code
- insider attacks
- malicious activities
- insider threat
- database
- input output
- normal traffic
- attack detection
- static analysis
- countermeasures
- online social networks
- malicious traffic
- semi fragile watermarking
- terrorist attacks
- identity theft
- security protocols
- watermarking scheme
- reverse engineering
- network traffic