Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,067,598 papers from all fields of science
Search
Sign In
Create Free Account
Interest Flooding Attack
An Interest Flooding Attack (IFA) is a Denial-of-service attack attack in an Information-centric network (or Content-Centric Networking (CCN) or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Broader (1)
Cyberwarfare
Denial-of-service attack
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack
Guang Cheng
,
Lixia Zhao
,
Xiaoyan Hu
,
Shaoqi Zheng
,
Hua Wu
,
Chengyu Fan
EURASIP Journal on Wireless Communications and…
2020
Corpus ID: 220504093
Interest Flooding Attack (IFA) is one of the main security threats for the Named Data Networking (NDN). Most of its existing…
Expand
2018
2018
An Insightful Experimental Study of a Sophisticated Interest Flooding Attack in NDN
Lixia Zhao
,
Guang Cheng
,
+4 authors
Chengyu Fan
1st IEEE International Conference on Hot…
2018
Corpus ID: 57763711
NDN (Named Data Networking), a promising next-generation architecture, puts named content in the first place of the network and…
Expand
2016
2016
Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network
A. Rajab
,
Chin-Tser Huang
,
M. Al-Shargabi
,
J. Cobb
Information Security Practice and Experience
2016
Corpus ID: 36766315
Optical burst switching (OBS) network is a promising switching technology for building the next-generation of Internet backbone…
Expand
2016
2016
Modeling NDN PIT to analyze the limits of timeout on the effectiveness of flooding attacks
Flavio Guimaraes
,
Antonio A. Rocha
,
C. Albuquerque
,
Igor G. Ribeiro
International Symposium on Computers and…
2016
Corpus ID: 2399575
Named Data Networking (NDN) is one of the promising proposals of Future Internet Architectures (FIAs). Similarly to most of the…
Expand
2015
2015
Lightweight coordinated defence against interest flooding attacks in NDN
H. Salah
,
Julian Wulfheide
,
T. Strufe
Conference on Computer Communications Workshops
2015
Corpus ID: 2142568
Named-Data Networking (NDN) is a promising architecture for future Internet. However, routers and content providers in NDN can be…
Expand
2015
2015
Interest Flow Control Method Based on User Reputation and Content Name Prefixes in Named Data Networking
Sayaka Umeda
,
Takashi Kamimoto
,
Yuri Ohata
,
H. Shigeno
IEEE Trustcom/BigDataSE/ISPA
2015
Corpus ID: 20221215
Interest Flooding Attack (IFA) is a big problem in Named Data Networking (NDN). In IFA, an attacker repeats sending an excessive…
Expand
2014
2014
An Optimal Statistical Test for a Robust Detection of Interest Flooding Attacks in CCN
Ngoc-Tan Nguyen
2014
Corpus ID: 195060724
Confronting the changing demand of users, the current Internet is revealing its limitations. Information Centric Network (ICN…
Expand
2013
2013
Correlations between reinfall data and insurance damage data related to sewer flooding for the case of Aarhus, Denmark
M. Spekkers
,
Qianqian Zhou
,
K. Arnbjerg-Nielsen
,
F. Clemens
,
J. Veldhuis
2013
Corpus ID: 59066399
Sewer flooding due to extreme rainfall may result in considerable damage. Damage data to quantify costs of cleaning, drying, and…
Expand
2011
2011
Strategy based proxy to secure user agent from flooding attack in SIP
I. Hussain
,
Farid Naït-Abdesselam
International Wireless Communications & Mobile…
2011
Corpus ID: 12739070
Voice over IP (VoIP) technology has proven to be an immensely useful technology during the last decade. Not only it provides…
Expand
2007
2007
The effect of growing season length and water level fluctuations on growth and survival of two rare and at risk Atlantic Coastal Plain flora species, Coreopsis rosea and Hydrocotyle umbellata
Jennifer M. LuskJ.M. Lusk
,
E. Reekie
2007
Corpus ID: 59459472
This study examined variables that may be limiting rare species of Nova Scotia’s Coastal Plain flora to determine why they have…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE