IoT-based DDoS on cyber physical systems: Research challenges, datasets and future prospects

M Snehi, A Bhandari - 2022 IEEE International IOT, Electronics …, 2022 - ieeexplore.ieee.org
The fusion of widespread IoT devices, highly adopted cloud services, and advanced network
technologies has laid the foundation of Cyber-Physical Systems. However, the architecture …

A novel distributed stack ensembled meta-learning-based optimized classification framework for real-time prolific IoT traffic streams

M Snehi, A Bhandari - Arabian Journal for Science and Engineering, 2022 - Springer
The concurrence of state-of-the-art Industrial 5G, Cyber-Physical Systems, Smart-Systems,
Industrial Internet of Things, and Additive Manufacturing paves the next-level digital …

Light Weight Gradient Ensemble Model for detecting network attack at the edge of the IoT network

D Santhadevi, B Janet - International Journal of Information Technology, 2023 - Springer
An intelligent malware prediction system is needed for monitoring the network traffic of
traditional and future network attacks. The Internet of Things (IoT) is fully connected and …

Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems

M Snehi, A Bhandari, J Verma - Computers & Security, 2024 - Elsevier
Introduction The convergence of the Internet of Anything (IoX), software-defined
communication layer, and sophisticated cloud platform has steered the dawn of the fourth …

An SDN/NFV based intelligent fog architecture for DDoS defense in cyber physical systems

M Snehi, A Bhandari - … on System Modeling & Advancement in …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has garnered considerable interest in recent years as its
technical capabilities have facilitated the creation of a diverse variety of commercial revenue …

Recent advancements in the state of cloud security in cyber physical systems

J Verma, A Bhandari, G Singh - Security and Resilience of Cyber …, 2022 - taylorfrancis.com
Recent advancements in information technology and the ever-increasing sophistication of
digital networks have compelled creating the orchestration of intelligent technologies: cyber …

Non-Negative Matrix Factorisation for Feature Selection: A Proposed Approach for the Detection of Multi-Stage Attacks

M Lefoane, I Ghafir, S Kabir… - 2024 14th International …, 2024 - ieeexplore.ieee.org
With the emergence of digital technologies like 5G wireless networks, cloud computing, and
the Internet of Things (IoT), our daily lives, travel, and work have undergone a …

[PDF][PDF] Analisis Insider Threat pada Sistem Keamanan Rumah Cerdas Menggunakan Malicious Traffic Monitoring

D Hariyadi, C Finansia - Jurnal Aplikasi Teknologi Informasi dan …, 2023 - core.ac.uk
Ancaman serangan siber semakin banyak dan kompleks, berdasarkan catatan Badan Siber
dan Sandi Negara (BSSN) bahwa di Indonesia pada tahun 2022 terdapat anomali trafik …

IoT-POT: Machine Learning-based Detection of Mirai Botnet Attacks in IoT

A Sharma, H Babbar - 2024 First International Conference on …, 2024 - ieeexplore.ieee.org
The Mirai botnet attack has become a serious threat to Internet of Things (IoT) devices
because it can undermine network security by launching large-scale attacks by taking …

Performance Evaluation of Path Restoration Techniques in a Network Check for updates

V Baggan, J Snehi, M Snehi… - Advances in Data Science …, 2023 - books.google.com
The life during Corona pandemic emphasized network connectivity as a vital requirement.
And due to safety concerns, almost every organization had been shifted to online mode. The …