Key Observation to Prevent IP Spoofing in DDoS Attack on Cloud Environment

T Sunitha, V Vijayashanthi… - … : Proceedings of SoCTA …, 2023 - Springer
The utilization of Cloud to put together and execute Distributed Denial of Service (DDoS)
assaults is well-known among programmers in the current scenario. In the existing …

Daiss: Design of an attacker identification scheme in coap request/response spoofing

D Ray, P Bhale, S Biswas, S Nandi… - TENCON 2021-2021 …, 2021 - ieeexplore.ieee.org
Constrained Application Protocol (CoAP), an IETF-standardized web transfer protocol, is
specially designed to facilitate resource-constrained devices and low power, lossy networks …

ML for IEEE 802.15. 4e/TSCH: energy efficient approach to detect DDoS attack using machine learning

P Bhale, S Biswas, S Nandi - 2021 International Wireless …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a way to communicate with the real world without much human
involvement. It is booming in today's computing world, with billions of devices having …

Smart City Vulnerabilities: An Overview

A Das, P Bhale - A Practical Guide on Security and Privacy in Cyber …, 2024 - World Scientific
With recent improvements in information and communication technology, a “smart city” has
been created to make the most of the resources in cities in a dynamic way. Smart cities can …

Effective Intrusion Detection Model Using Raptor Optimized Deep Convolutional Neural Network

K Mahanta, HB Maringanti… - 2023 IEEE Guwahati …, 2023 - ieeexplore.ieee.org
Malicious behavior in the system must be recognized for ensure security because the
occurrence of the intrusions can threaten the valuable data and threatens the quality of the …