Stuck in Traffic (SiT) attacks: A framework for identifying stealthy attacks that cause traffic congestion

被引:0
|
作者
机构
[1] Guirguis, Mina
[2] Atia, George
来源
| 2013年 / Institute of Electrical and Electronics Engineers Inc., United States卷
关键词
406.1 Highway Systems - 432.4 Highway Traffic Control - 723 Computer Software; Data Handling and Applications - 723.4 Artificial Intelligence - 723.5 Computer Applications - 902.3 Legal Aspects - 921.6 Numerical Methods - 922.1 Probability Theory;
D O I
6692769
中图分类号
学科分类号
摘要
24
引用
收藏
相关论文
共 50 条
  • [31] The web browser factor in traffic analysis attacks
    Zhioua, Sami
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4227 - 4241
  • [32] Traffic analysis attacks on Skype VoIP calls
    Zhu, Ye
    Fub, Huirong
    COMPUTER COMMUNICATIONS, 2011, 34 (10) : 1202 - 1212
  • [33] Multipath TCP Traffic Diversion Attacks and Countermeasures
    Munir, Ali
    Qian, Zhiyun
    Shafiq, Zubair
    Liu, Alex
    Le, Franck
    2017 IEEE 25TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2017,
  • [34] Measurement of DNS traffic caused by DDoS attacks
    Ishibashi, K
    Toyono, T
    Matsuoka, H
    Toyama, K
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 118 - 121
  • [35] A Study of Traffic Survivability Under Malicious Attacks
    Hu, Yen-Hung
    Yun, Mira
    Tang, Debra
    Choi, Hyeong-Ah
    2006 IEEE SARNOFF SYMPOSIUM, 2006, : 172 - +
  • [36] POSTER: Traffic Analysis Attacks in Anonymity Networks
    Kohis, Katharina
    Popper, Christina
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 917 - 919
  • [37] Analysis of traffic correlation attacks on router queues
    Cai, Yan
    Lee, Patrick P. C.
    Gong, Weibo
    Towsley, Don
    COMPUTER NETWORKS, 2011, 55 (03) : 734 - 747
  • [38] Modeling Cyber Attacks at Intelligent Traffic Signals
    Comert, Gurcan
    Pollard, Jacquan
    Nicol, David M.
    Palani, Kartik
    Vignesh, Babu
    TRANSPORTATION RESEARCH RECORD, 2018, 2672 (01) : 76 - 89
  • [39] Flooding attacks detection in traffic of backbone networks
    Salem, Osman
    Makke, Ali
    Tajer, Jean
    Mehaoua, Ahmed
    Proceedings - Conference on Local Computer Networks, LCN, 2011, : 441 - 449
  • [40] On Jamming Attacks in Crowdsourced Air Traffic Surveillance
    Leonardi, Mauro
    Strohmeier, Martin
    Lenders, Vincent
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2021, 36 (06) : 44 - 54