Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2014
Towards detecting target link flooding attack
LISA'14: Proceedings of the 28th USENIX conference on Large Installation System AdministrationPages 81–96A new class of target link flooding attacks (LFA) can cut off the Internet connections of a target area without being detected because they employ legitimate flows to congest selected links. Although new mechanisms for defending against LFA have been ...
- ArticleNovember 2014
Realtime high-speed network traffic monitoring using ntopng
LISA'14: Proceedings of the 28th USENIX conference on Large Installation System AdministrationPages 69–79Monitoring network traffic has become increasingly challenging in terms of number of hosts, protocol proliferation and probe placement topologies. Virtualised environments and cloud services shifted the focus from dedicated hardware monitoring devices ...