Skip to content
Siavoosh Payandeh Azad edited this page Feb 20, 2019 · 7 revisions

Introduction

This work focuses on the identification of location of the collision point of single attacker's flow with the sensitive data. On the network. This will significantly reduce the search space of locating the attacker's node for further isolation.

The implementation of these monitors can be found in the DoS monitor VHDL file.

Clone this wiki locally