Stuck in Traffic (SiT) attacks: A framework for identifying stealthy attacks that cause traffic congestion

被引:0
|
作者
机构
[1] Guirguis, Mina
[2] Atia, George
来源
| 2013年 / Institute of Electrical and Electronics Engineers Inc., United States卷
关键词
406.1 Highway Systems - 432.4 Highway Traffic Control - 723 Computer Software; Data Handling and Applications - 723.4 Artificial Intelligence - 723.5 Computer Applications - 902.3 Legal Aspects - 921.6 Numerical Methods - 922.1 Probability Theory;
D O I
6692769
中图分类号
学科分类号
摘要
24
引用
收藏
相关论文
共 50 条
  • [41] Traffic Remapping Attacks in Ad Hoc Networks
    Szott, Szymon
    Konorski, Jerzy
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (04) : 218 - 224
  • [42] On Jamming Attacks in Crowdsourced Air Traffic Surveillance
    Leonardi, Mauro
    Strohmeier, Martin
    Lenders, Vincent
    IEEE Aerospace and Electronic Systems Magazine, 2021, 36 (06): : 44 - 54
  • [43] Big Data Analytics of Network Traffic and Attacks
    Wang, Lidong
    Jones, Randy
    NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 117 - 123
  • [44] Flooding Attacks Detection in Traffic of Backbone Networks
    Salem, Osman
    Makke, Ali
    Tajer, Jean
    Mehaoua, Ahmed
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 441 - 449
  • [45] Do ridesharing services cause traffic congestion?
    Pang, Jindong
    Shen, Shulin
    CANADIAN JOURNAL OF ECONOMICS-REVUE CANADIENNE D ECONOMIQUE, 2023, 56 (02): : 520 - 552
  • [46] Toward practical defense against traffic analysis attacks on encrypted DNS traffic
    Niakanlahiji, Amirreza
    Orlowski, Soeren
    Vahid, Alireza
    Jafarian, J. Haadi
    COMPUTERS & SECURITY, 2023, 124
  • [47] Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing
    Hafeez, Ibbad
    Antikainen, Markku
    Tarkoma, Sasu
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 196 - 201
  • [48] A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events
    Bhatia, Sajal
    Schmidt, Desmond
    Mohay, George
    Tickle, Alan
    COMPUTERS & SECURITY, 2014, 40 : 95 - 107
  • [49] An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
    Li, M
    COMPUTERS & SECURITY, 2004, 23 (07) : 549 - 558
  • [50] Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications
    Chaudhry, Aawista
    Halabi, Talal
    Zulkernine, Mohammad
    52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022), 2022, : 1 - 7