Lei Yan1, Maode Ma2, Dandan Li1, Xiaohong Huang1,*, Yan Ma1, Kun Xie1
CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 2137-2162, 2023, DOI:10.32604/cmes.2022.022462
- 20 September 2022
Abstract The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional
methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. In these
existing mechanisms, the identification of malicious flows depends on the IP address. However, the IP address is
easy to be changed by attacks. Compared with the IP address, the certificate is more challenging to be tampered with
or forged. Moreover, the traffic trend in the network is towards encryption. The certificates are popularly utilized
by IoT devices for authentication in encryption… More >
Graphic Abstract