Skip to main content

Showing 1–3 of 3 results for author: Rezazad, M

.
  1. arXiv:2201.04353  [pdf, other

    cs.DL

    A simple model for citation curve

    Authors: Y. C. Tay, Mostafa Rezazad, Hamid Sarbazi-Azad

    Abstract: There is considerable interest in the citation count for an author's publications. This has led to many proposals for citation indices for characterizing citation distributions. However, there is so far no tractable model to facilitate the analysis of these distributions and the design of these indices. This paper presents a simple equation for such design and analysis. The equation has three para… ▽ More

    Submitted 12 January, 2022; originally announced January 2022.

    Comments: 13 pages, 19 figures, 2 tables

  2. Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning

    Authors: Mostafa Rezazad, Matthias R. Brust, Mohammad Akbari, Pascal Bouvry, Ngai-Man Cheung

    Abstract: A novel class of extreme link-flooding DDoS (Distributed Denial of Service) attacks is designed to cut off entire geographical areas such as cities and even countries from the Internet by simultaneously targeting a selected set of network links. The Crossfire attack is a target-area link-flooding attack, which is orchestrated in three complex phases. The attack uses a massively distributed large-s… ▽ More

    Submitted 1 March, 2019; originally announced March 2019.

    Comments: arXiv admin note: text overlap with arXiv:1801.00235

    Journal ref: Advances in Intelligent Systems and Computing, 2018

  3. arXiv:1801.00235  [pdf, other

    cs.CR

    Early detection of Crossfire attacks using deep learning

    Authors: Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Matthias R. Brust, Ngai-Man Cheung

    Abstract: Crossfire attack is a recently proposed threat designed to disconnect whole geographical areas, such as cities or states, from the Internet. Orchestrated in multiple phases, the attack uses a massively distributed botnet to generate low-rate benign traffic aiming to congest selected network links, so-called target links. The adoption of benign traffic, while simultaneously targeting multiple netwo… ▽ More

    Submitted 19 April, 2018; v1 submitted 30 December, 2017; originally announced January 2018.

    Comments: 5 pages, 5 figures.Presented at Deep Learning Security Workshop 2017, Singapore. Added references for section 2 and section 4. Added new author