Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline

Article Types

Countries / Regions

Search Results (1)

Search Parameters:
Keywords = IP random-hopping

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 3861 KB  
Article
Mitigating Crossfire Attacks via Topology Spoofing Based on ENRNN-MTD
by Dexian Chang, Xiaobing Zhang, Jiajia Sun and Chen Fang
Appl. Sci. 2025, 15(21), 11432; https://doi.org/10.3390/app152111432 (registering DOI) - 25 Oct 2025
Abstract
Crossfire attacks disrupt network services by targeting critical links of server groups, causing traffic congestion and server failures that prevent legitimate users from accessing services. To counter this threat, this study proposes a novel topology spoofing defense mechanism based on a sequence-based Graph [...] Read more.
Crossfire attacks disrupt network services by targeting critical links of server groups, causing traffic congestion and server failures that prevent legitimate users from accessing services. To counter this threat, this study proposes a novel topology spoofing defense mechanism based on a sequence-based Graph Neural Network–Moving Target Defense (ENRNN-MTD). During the reconnaissance phase, the method employs a GNN to generate multiple random and diverse virtual topologies, which are mapped to various external hosts. This obscures the real internal network structure and complicates the attacker’s ability to accurately identify it. In the attack phase, an IP random-hopping mechanism using a chaotic sequence is introduced to conceal node information and increase the cost of launching attacks, thereby enhancing the protection of critical services. Experimental results demonstrate that, compared to existing defense mechanisms, the proposed approach exhibits significant advantages in terms of deception topology randomness, defensive effectiveness, and system load management. Full article
(This article belongs to the Special Issue IoT Technology and Information Security)
Show Figures

Figure 1

Back to TopTop