Zippy: On-demand network flooding

F Sutton, B Buchli, J Beutel, L Thiele - … of the 13th ACM Conference on …, 2015 - dl.acm.org
… We present ZiPPY, an on-demand flooding technique that provides robust asynchronous
net… to demonstrate the on-demand flooding of rare events through a multihop network with end-…

Bypass routing: An on-demand local recovery protocol for ad hoc networks

C Sengul, R Kravets - Ad Hoc Networks, 2006 - Elsevier
… Other protocols reduce the frequency of flooding by allowing a relay node to initiate a limited
… an efficient on-demand local recovery protocol that reduces route request floods due to …

A survey of link flooding attacks in software defined network ecosystems

R ur Rasool, H Wang, U Ashraf, K Ahmed… - Journal of Network and …, 2020 - Elsevier
… This attack type has the ability to disable network links by flooding them with attack traffic. …
against TCP SYN flooding attack where an attacking application floods the control plane by …

A Simple and Energy‐Efficient Flooding Scheme for Wireless Routing

S Yamazaki, Y Abiko, H Mizuno - … Communications and Mobile …, 2020 - Wiley Online Library
Flooding efficiency is important for nodes, because they are driven by limited batteries. In
this paper, we propose a simple flooding … scheme to ad hoc on-demand distance vector (AODV…

Internet factories: Creating application-specific networks on-demand

R Strijkers, MX Makkes, C de Laat, R Meijer - Computer Networks, 2014 - Elsevier
… The number of concurrently running operations to create network elements was limited to
15 to avoid Amazon EC2 denying service due to a flood of service requests. The number was …

[PDF][PDF] CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds.

Y Gilad, A Herzberg, M Sudkovitch, M Goberman - NDSS, 2016 - ndss-symposium.org
… agent that clients automatically download from the content-origin … Clientless secure-objects
allow CDN-on-Demand to utilize … set of measurements we evaluate direct flooding attacks (ie, …

Puppet attack: A denial of service attack in advanced metering infrastructure network

P Yi, T Zhu, Q Zhang, Y Wu, L Pan - … of Network and Computer Applications, 2016 - Elsevier
… attacker and flood more packets so as to exhaust the network … the same damage as a flooding
attack and the proposed … an on-demand routing protocol using in wireless mesh network

An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks

A Dhanapal, P Nithyanandam - Wireless Networks, 2021 - Springer
on-demand network access to a shared pool of configurable computing resources such as
networks… five characteristics: on-demand self-service, broad network access, resource pooling…

A heterogeneous system architecture for event-triggered wireless sensing

F Sutton, R Da Forno, D Gschwend… - … in Sensor Networks …, 2016 - ieeexplore.ieee.org
Network Wake-up. Due to the non-deterministic nature of acoustic … eg, ZIPPY [2], for the
rapid wake-up of a multi-hop network. The ZIPPY protocol provides on-demand network flooding

On-demand multicast routing protocol with efficient route discovery

MA Kharraz, H Sarbazi-Azad, AY Zomaya - Journal of Network and …, 2012 - Elsevier
… of On-Demand Multicast Routing Protocol (ODMRP). Our framework, called limited flooding
ODMRP, improves multicasting mechanism by efficiently managing flooding mechanism …