[HTML][HTML] Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Abstract The Internet of Things (IoT) technologies continuously expand with time due to the
advances in automated, connected device technology, mobility, and wide access to …
advances in automated, connected device technology, mobility, and wide access to …
Performance modeling and analysis of network firewalls
Network firewalls act as the first line of defense against unwanted and malicious traffic
targeting Internet servers. Predicting the overall firewall performance is crucial to network …
targeting Internet servers. Predicting the overall firewall performance is crucial to network …
ADMS: An online attack detection and mitigation system for LDoS attacks via SDN
Abstract Low-rate Denial of Service (LDoS) attacks cause severe destructiveness to network
security. Consequently, the implementation of detection and defense against them is a …
security. Consequently, the implementation of detection and defense against them is a …
Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services
A malicious attack that can prevent establishment of Internet connections to web servers is
termed as a Denial of Service (DoS) attack; volume and intensity of which is rapidly growing …
termed as a Denial of Service (DoS) attack; volume and intensity of which is rapidly growing …
AKN-FGD: adaptive kohonen network based fine-grained detection of ldos attacks
Low-rate denial of service (LDoS) attacks exploit the security vulnerabilities of network
protocols adaptive mechanisms to launch periodic bursts. These attacks result in the severe …
protocols adaptive mechanisms to launch periodic bursts. These attacks result in the severe …
FR-RED: Fractal residual based real-time detection of the LDoS attack
D Tang, Y Feng, S Zhang, Z Qin - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The low-rate denial of service (LDoS) attack mainly exploits security vulnerabilities of
adaptive mechanisms in network protocols and application services. The high-rate attack …
adaptive mechanisms in network protocols and application services. The high-rate attack …
Evaluation of the impact of EDoS attacks against cloud computing services
Cloud computing is currently one of the fastest growing segments of IT. To date, and
according to a recent survey conducted by the International Data Corporation, security is the …
according to a recent survey conducted by the International Data Corporation, security is the …
Low-rate dos attack detection based on improved logistic regression
Y Yan, D Tang, S Zhan, R Dai… - 2019 IEEE 21st …, 2019 - ieeexplore.ieee.org
Low-rate denial of service (LDoS) attack sends high-intensity burst data streams to victims,
in order to reduce TCP traffic and cut down on network service capabilities. Since the LDoS …
in order to reduce TCP traffic and cut down on network service capabilities. Since the LDoS …
Distributed denial-of-service attacks against http/2 services
HTTP/2 is the second major version of the HTTP protocol published by the internet
engineering steering group. The protocol is designed to improve reliability and performance …
engineering steering group. The protocol is designed to improve reliability and performance …
Low-rate denial-of-service attacks against HTTP/2 services
HTTP/2 is the second major version of the HTTP protocol approved by the Internet
Engineering Steering Group (IESG). Although the semantics of how messages are …
Engineering Steering Group (IESG). Although the semantics of how messages are …