Fundamental Scaling Laws of Covert DDoS Attacks

ACM SIGMETRICS Performance Evaluation Review(2022)

引用 13|浏览3
暂无评分
摘要
The Internet has become an indispensable commodity in the last several years. This achievement was parallel to the growth of sophistication that home networks have undergone, nowadays hosting a variety of devices such as PCs, tablets, mobile phones and specialized apparatus such as smart thermostats and other Internet of things (IoT) devices. While these devices offer users an array of services and conveniences, they come at the cost of increasing the attack surface of the home network.Because of the vulnerabilities of such devices, they have been increasingly used as the source of Distributed Denial-of-Service (DDoS) attacks.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要