scispace - formally typeset
J

Jelena Mirkovic

Researcher at Information Sciences Institute

Publications -  114
Citations -  5086

Jelena Mirkovic is an academic researcher from Information Sciences Institute. The author has contributed to research in topics: Denial-of-service attack & Computer science. The author has an hindex of 28, co-authored 89 publications receiving 4710 citations. Previous affiliations of Jelena Mirkovic include University of California, Los Angeles & University of Southern California.

Papers
More filters

Profiling and Clustering Internet Hosts.

TL;DR: The proposed clustering approach is applied to a data set from NLANRPMA Internet traffic archive with more than 60,000 active hosts and successfully identifies clusters with significant and interpretable features.
Proceedings ArticleDOI

Benchmarks for DDOS Defense Evaluation

TL;DR: A benchmark suite defining the elements necessary to recreate DDoS attack scenarios in a testbed setting, a set of performance metrics that express a defense system's effectiveness, cost, and security, and a specification of a testing methodology that provides guidelines on using benchmarks and summarizing and interpreting performance measures are described.
Proceedings ArticleDOI

Towards user-centric metrics for denial-of-service measurement

TL;DR: A series of DoS impact metrics that measure the QoS experienced by end users during an attack are proposed and it is demonstrated that these metrics capture the doS impact more precisely than the measures used in the past.
Journal Article

Class capture-the-flag exercises

TL;DR: Class Capture-theFlag exercises (CCTFs) are proposed to revitalize cybersecurity education and are described how to design these exercises to be easy for teachers to conduct and grade, easy for students to prepare for and a lot of fun for everyone involved.
Proceedings ArticleDOI

A self-organizing approach to data forwarding in large-scale sensor networks

TL;DR: This paper organizes sensors into a dynamic, self-optimizing multicast tree-based forwarding hierarchy, which is data centric and robust to node failures, and demonstrates the effectiveness of the design through simulations.