Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks
Publications associées (53)
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
From medical support to education and remote work, our everyday lives increasingly depend on Internet performance. When users experience poor performance, however, the decentralization of the Internet allows limited visibility into which network is respons ...
In the last decades the Internet traffic has greatly evolved. The advent of new Internet services and applications has, in fact, led to a significant growth of the amount of data transmitted, as well as to a transformation of the data type. As a matter of ...
Website fingerprinting (WF) attacks can compromise a user’s online privacy, by learning network traffic patterns generated by websites through machine learning (ML) techniques. Such attacks remain unaffected by encryption and even defeat anonymity services ...
Virtually every connection to an Internet service is preceded by a DNS lookup. Lookups are performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship. To address these issues, large organizations s ...
INTERNET SOC2020
, ,
The paper considers the problem of detecting cyber-attacks occurring in communication networks typically used in the secondary control layer of DC microgrids. The proposed distributed methodology allows for scalable monitoring of a microgrid and is able to ...
A data storage medium (2) comprising a stacked plurality of layers (9), each layer composed of a layer material selected from a group comprising at least two different dielectric materials, adjacent layers being formed of different materials, and at least ...
2023
, ,
The paper considers the problem of detecting cyber-attacks occurring in communication networks typically used in the secondary control layer of DC microgrids. The proposed distributed methodology allows for scalable monitoring of a microgrid and is able to ...
Real-time control of electric grids is a novel approach to handling the increasing penetration of distributed and volatile energy generation brought about by renewables. Such control occurs in cyber-physical systems (CPSs), in which software agents maintai ...
Intrusion detection systems are a commonly deployed defense that examines network traffic, host operations, or both to detect attacks. However, more attacks bypass IDS defenses each year, and with the sophistication of attacks increasing as well, we must e ...
IRGC organised in 2016 an expert workshop on 'Governing Cybersecurity Risks and Benefits in the Internet of Things (IoT), applied to connected vehicles and medical devices. In those sectors, connectivity improves both safety and vulnerability, but cybersec ...