Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

P Shukla, CR Krishna, NV Patil - The Journal of Supercomputing, 2024 - Springer
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …

Distributed denial of service attacks and its defenses in IoT: a survey

MM Salim, S Rathore, JH Park - The Journal of Supercomputing, 2020 - Springer
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …

[HTML][HTML] An entropy-based network anomaly detection method

P Bereziński, B Jasiul, M Szpyrka - Entropy, 2015 - mdpi.com
Data mining is an interdisciplinary subfield of computer science involving methods at the
intersection of artificial intelligence, machine learning and statistics. One of the data mining …

[CARTE][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development

A Verma, R Saha, N Kumar, G Kumar - Multimedia Tools and Applications, 2022 - Springer
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …

Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms

V de Miranda Rios, PRM Inácio, D Magoni… - Computer Networks, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are still among the most dangerous
attacks on the Internet. With the advance of methods for detecting and mitigating these …

Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest

M Idhammad, K Afdel, M Belouch - Security and …, 2018 - Wiley Online Library
Cloud Computing services are often delivered through HTTP protocol. This facilitates access
to services and reduces costs for both providers and end‐users. However, this increases the …

OPERETTA: An OPEnflow-based REmedy to mitigate TCP SYNFLOOD Attacks against web servers

S Fichera, L Galluccio, SC Grancagnolo, G Morabito… - Computer Networks, 2015 - Elsevier
TCP SYNFLOOD attacks are a type of Distributed Denial of Service (DDoS) attacks usually
carried out against web servers. TCP SYNFLOOD rely on the normal TCP Three-Way …

A threat analysis of the vehicle-to-grid charging protocol ISO 15118

K Bao, H Valev, M Wagner, H Schmeck - Computer Science-Research …, 2018 - Springer
This work performs a security analysis of the vehicle-to-grid charging protocol ISO 15118
and presents various scenarios of how to compromise the availability of the charging service …

[PDF][PDF] Security of distributed intelligence in edge computing: Threats and countermeasures

MS Ansari, SH Alsamhi, Y Qiao, Y Ye… - The Cloud-to-Thing …, 2020 - library.oapen.org
Rapid growth in the amount of data produced by IoT sensors and devices has led to the
advent of edge computing wherein the data is processed at a point at or near to its origin …