[HTML][HTML] Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices

HU Khan, M Sohail, F Ali, S Nazir, YY Ghadi… - Physical …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technologies continuously expand with time due to the
advances in automated, connected device technology, mobility, and wide access to …

Performance modeling and analysis of network firewalls

K Salah, K Elbadawi, R Boutaba - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Network firewalls act as the first line of defense against unwanted and malicious traffic
targeting Internet servers. Predicting the overall firewall performance is crucial to network …

ADMS: An online attack detection and mitigation system for LDoS attacks via SDN

D Tang, X Wang, Y Yan, D Zhang, H Zhao - Computer Communications, 2022 - Elsevier
Abstract Low-rate Denial of Service (LDoS) attacks cause severe destructiveness to network
security. Consequently, the implementation of detection and defense against them is a …

Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services

E Adi, Z Baig, P Hingston - Journal of Network and Computer Applications, 2017 - Elsevier
A malicious attack that can prevent establishment of Internet connections to web servers is
termed as a Denial of Service (DoS) attack; volume and intensity of which is rapidly growing …

AKN-FGD: adaptive kohonen network based fine-grained detection of ldos attacks

D Tang, X Wang, X Li, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Low-rate denial of service (LDoS) attacks exploit the security vulnerabilities of network
protocols adaptive mechanisms to launch periodic bursts. These attacks result in the severe …

FR-RED: Fractal residual based real-time detection of the LDoS attack

D Tang, Y Feng, S Zhang, Z Qin - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The low-rate denial of service (LDoS) attack mainly exploits security vulnerabilities of
adaptive mechanisms in network protocols and application services. The high-rate attack …

Evaluation of the impact of EDoS attacks against cloud computing services

F Al-Haidari, M Sqalli, K Salah - Arabian Journal for Science and …, 2015 - Springer
Cloud computing is currently one of the fastest growing segments of IT. To date, and
according to a recent survey conducted by the International Data Corporation, security is the …

Low-rate dos attack detection based on improved logistic regression

Y Yan, D Tang, S Zhan, R Dai… - 2019 IEEE 21st …, 2019 - ieeexplore.ieee.org
Low-rate denial of service (LDoS) attack sends high-intensity burst data streams to victims,
in order to reduce TCP traffic and cut down on network service capabilities. Since the LDoS …

Distributed denial-of-service attacks against http/2 services

E Adi, ZA Baig, P Hingston, CP Lam - Cluster Computing, 2016 - Springer
HTTP/2 is the second major version of the HTTP protocol published by the internet
engineering steering group. The protocol is designed to improve reliability and performance …

Low-rate denial-of-service attacks against HTTP/2 services

E Adi, Z Baig, CP Lam… - 2015 5th International …, 2015 - ieeexplore.ieee.org
HTTP/2 is the second major version of the HTTP protocol approved by the Internet
Engineering Steering Group (IESG). Although the semantics of how messages are …