Aapo Kalliola

  • Citations Per Year
Learn More
Mitigating distributed denial-of-service attacks can be a complex task due to the wide range of attack types, attacker adaptation, and defender constraints. We propose a defense mechanism which is largely automated and can be implemented on current software defined networking (SDN)-enabled networks. Our mechanism combines normal traffic learning, external(More)
The existing body of research on malware simulation does not make full use of the topological and geographic location of the simulated malware-infected computers on the internet. We address this issue for creating a topologically-aware framework for modeling the spread of malware. Our framework can accommodate a variety of infection models, as well as(More)
In a modern telco cloud, network functions are performed by groups of single or interconnected virtual machines (VMs), which form virtualized network functions (VNFs). Securing these VNFs is both important and challenging, since the VNFs might be performing some mission critical operations and exchanging sensitive information among each other. The problem(More)
This paper describes different interfaces exposed by Linux kernel to applications. The focus is on the socket application interface that provides support for BSD sockets as defined in Berkeley Software Architecture Manual, 4.4. Other topics cover /proc/sys file system and system control (sysctl), input/output control ioctl mechanism and Netlink sockets.(More)
  • 1