Skip to main content

Showing 1–3 of 3 results for author: Shafir, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07232  [pdf, other

    cs.CR

    A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection

    Authors: Raja Giryes, Lior Shafir, Avishai Wool

    Abstract: Distributed Denial of Service (DDoS) attacks are getting increasingly harmful to the Internet, showing no signs of slowing down. Develo** an accurate detection mechanism to thwart DDoS attacks is still a big challenge due to the rich variety of these attacks and the emergence of new attack vectors. In this paper, we propose a new tree-based DDoS detection approach that operates on a flow as a st… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  2. arXiv:2005.09107  [pdf

    cs.CR

    NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities

    Authors: Yehuda Afek, Anat Bremler-Barr, Lior Shafir

    Abstract: This paper exposes a new vulnerability and introduces a corresponding attack, the NoneXistent Name Server Attack (NXNSAttack), that disrupts and may paralyze the DNS system, making it difficult or impossible for Internet users to access websites, web e-mail, online video chats, or any other online resource. The NXNSAttack generates a storm of packets between DNS resolvers and DNS authoritative nam… ▽ More

    Submitted 29 September, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

  3. arXiv:1911.00253  [pdf, other

    cs.NI

    NFV-based IoT Security for Home Networks using MUD

    Authors: Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Abraham, Avraham Shalev

    Abstract: A new scalable ISP level system architecture to secure and protect all IoT devices in a large number of homes is presented. The system is based on whitelisting, as in the Manufacturer Usage Description (MUD) framework, implemented as a VNF. Unlike common MUD suggestions that place the whitelist application at the home/enterprise network, our approach is to place the enforcement upstream at the pro… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.