Design and analysis of probing route to defense sink-hole attacks for Internet of Things security

Y Liu, M Ma, X Liu, NN **ong, A Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) applications have been growing significantly in recent years,
however, the security issue has not been well studied in the literature for the IoT ecosystem …

An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks

T Chen, X Li, Y Wang, J Chen, Z Li, X Luo… - … Security Practice and …, 2017 - Springer
The gas mechanism in Ethereum charges the execution of every operation to ensure that
smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated …

SkyShield: A sketch-based defense system against application layer DDoS attacks

C Wang, TTN Miu, X Luo, J Wang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Application layer distributed denial of service (DDoS) attacks have become a severe threat
to the security of web servers. These attacks evade most intrusion prevention systems by …

Low-rate DoS attacks detection based on network multifractal

Z Wu, L Zhang, M Yue - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Low-rate denial of service (LDoS) attacks send periodic pulse sequences with relative low
rate to form aggregation flows at the victim end. LDoS attack flows have the characteristics of …

On a mathematical model for low-rate shrew DDoS

J Luo, X Yang, J Wang, J Xu, J Sun… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The shrew distributed denial of service (DDoS) attack is very detrimental for many
applications, since it can throttle TCP flows to a small fraction of their ideal rate at very low …

Adaptive artificial immune networks for mitigating DoS flooding attacks

JM Vidal, ALS Orozco, LJG Villalba - Swarm and Evolutionary Computation, 2018 - Elsevier
Denial of service attacks pose a threat in constant growth. This is mainly due to their
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …

Cyber security study for power systems under denial of service attacks

Y Shen, M Fei, D Du - … of the Institute of Measurement and …, 2019 - journals.sagepub.com
An open communication infrastructure is used to support data transmission in a modern
deregulated power system, it makes communication channels vulnerable to cyber-attacks …

Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach

Y Yuan, F Sun, H Liu - International Journal of Systems Science, 2016 - Taylor & Francis
This paper is concerned with the resilient control under denial-of-service attack launched by
the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical …

Power spectrum entropy based detection and mitigation of low-rate DoS attacks

Z Chen, CK Yeo, BS Lee, CT Lau - Computer Networks, 2018 - Elsevier
Abstract Low-Rate DoS (LDoS) attacks send periodical packet bursts to the bottleneck
routers which can throttle the bandwidth of TCP flows. They are difficult to detect while …

Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks

Z Wu, Q Pan, M Yue, L Liu - Computer Networks, 2019 - Elsevier
TCP-targeted Low-rate Denial of Service (LDoS) attack launches periodic flows at a
sufficiently low average rate that completely spread into large network traffic at the attack …