Skip to main content

Showing 1–2 of 2 results for author: Sateesan, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.14328  [pdf, other

    cs.CR cs.NI

    ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks

    Authors: Simon Scherrer, Jo Vliegen, Arish Sateesan, Hsu-Chun Hsiao, Nele Mentens, Adrian Perrig

    Abstract: Modern DDoS defense systems rely on probabilistic monitoring algorithms to identify flows that exceed a volume threshold and should thus be penalized. Commonly, classic sketch algorithms are considered sufficiently accurate for usage in DDoS defense. However, as we show in this paper, these algorithms achieve poor detection accuracy under burst-flood attacks, i.e., volumetric DDoS attacks composed… ▽ More

    Submitted 7 July, 2023; v1 submitted 25 June, 2023; originally announced June 2023.

    Comments: Accepted at the 42nd International Symposium on Reliable Distributed Systems (SRDS 2023)

  2. arXiv:2102.01397  [pdf, other

    cs.NI cs.CR

    Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows

    Authors: Simon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele E. Asoni, Arish Sateesan, Jo Vliegen, Nele Mentens, Hsu-Chun Hsiao, Adrian Perrig

    Abstract: Current probabilistic flow-size monitoring can only detect heavy hitters (e.g., flows utilizing 10 times their permitted bandwidth), but cannot detect smaller overuse (e.g., flows utilizing 50-100% more than their permitted bandwidth). Thus, these systems lack accuracy in the challenging environment of high-throughput packet processing, where fast-memory resources are scarce. Nevertheless, many ap… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.