Cyber scanning: a comprehensive survey
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …
Data collection for attack detection and security measurement in mobile ad hoc networks: A survey
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …
Scalable traffic sampling using centrality measure on software-defined networks
With regard to cyber security, pervasive traffic visibility is one of the most essential
functionalities for complex network systems. A traditional network system has limited access …
functionalities for complex network systems. A traditional network system has limited access …
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
Social insect colonies have survived over evolutionary time in part due to the success of
their collaborative methods: using local information and distributed decision making …
their collaborative methods: using local information and distributed decision making …
Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol
K Geetha, N Sreenath - Arabian Journal for Science and Engineering, 2016 - Springer
Mobile ad hoc networks (MANETs) play a vital role in ubiquitous computing. Multimedia
communication is the main aspect of MANETs in emergency networks. Security is the major …
communication is the main aspect of MANETs in emergency networks. Security is the major …
An experimental study on the applicability of SYN cookies to networked constrained devices
JJ Echevarria, P Garaizar… - Software: Practice and …, 2018 - Wiley Online Library
The Internet protocol suite is increasingly used on devices with constrained resources that
operate as both clients and servers within the Internet of Things paradigm. However, these …
operate as both clients and servers within the Internet of Things paradigm. However, these …
Spark-based port and net scan detection
Network security is more and more important today. Port and net scan are the typical
preliminary steps an attacker makes to find victims in a certain network, and are currently the …
preliminary steps an attacker makes to find victims in a certain network, and are currently the …
[PDF][PDF] An adaptive SYN flooding attack mitigation in DDOS environment
A honeypot being an information security server attract the hackers towards it by showing
open ports and services and monitor network traffic closely by playing some key feature …
open ports and services and monitor network traffic closely by playing some key feature …
Evasion of port scan detection in zeek and snort and its mitigation
G Barbour, A McDonald… - ECCWS 2021 20th …, 2021 - books.google.com
East-west cyberattacks typically scan for open TCP ports on local network hosts in order to
identify vulnerable services for subsequent exploitation. Since TCP port scans do not appear …
identify vulnerable services for subsequent exploitation. Since TCP port scans do not appear …
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction
H Li, Y Zhao, W Yao, K Xu, Q Li - Science China Information Sciences, 2023 - Springer
Distributed denial of service (DDoS) detection is still an open and challenging problem. In
particular, sophisticated attacks, eg, attacks that disguise attack packets as benign traffic …
particular, sophisticated attacks, eg, attacks that disguise attack packets as benign traffic …