Design and analysis of probing route to defense sink-hole attacks for Internet of Things security
Internet of Things (IoT) applications have been growing significantly in recent years,
however, the security issue has not been well studied in the literature for the IoT ecosystem …
however, the security issue has not been well studied in the literature for the IoT ecosystem …
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks
The gas mechanism in Ethereum charges the execution of every operation to ensure that
smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated …
smart contracts running in EVM (Ethereum Virtual Machine) will be eventually terminated …
SkyShield: A sketch-based defense system against application layer DDoS attacks
Application layer distributed denial of service (DDoS) attacks have become a severe threat
to the security of web servers. These attacks evade most intrusion prevention systems by …
to the security of web servers. These attacks evade most intrusion prevention systems by …
Low-rate DoS attacks detection based on network multifractal
Z Wu, L Zhang, M Yue - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Low-rate denial of service (LDoS) attacks send periodic pulse sequences with relative low
rate to form aggregation flows at the victim end. LDoS attack flows have the characteristics of …
rate to form aggregation flows at the victim end. LDoS attack flows have the characteristics of …
On a mathematical model for low-rate shrew DDoS
The shrew distributed denial of service (DDoS) attack is very detrimental for many
applications, since it can throttle TCP flows to a small fraction of their ideal rate at very low …
applications, since it can throttle TCP flows to a small fraction of their ideal rate at very low …
Adaptive artificial immune networks for mitigating DoS flooding attacks
Denial of service attacks pose a threat in constant growth. This is mainly due to their
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
tendency to gain in sophistication, ease of implementation, obfuscation and the recent …
Cyber security study for power systems under denial of service attacks
Y Shen, M Fei, D Du - … of the Institute of Measurement and …, 2019 - journals.sagepub.com
An open communication infrastructure is used to support data transmission in a modern
deregulated power system, it makes communication channels vulnerable to cyber-attacks …
deregulated power system, it makes communication channels vulnerable to cyber-attacks …
Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach
Y Yuan, F Sun, H Liu - International Journal of Systems Science, 2016 - Taylor & Francis
This paper is concerned with the resilient control under denial-of-service attack launched by
the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical …
the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical …
Power spectrum entropy based detection and mitigation of low-rate DoS attacks
Z Chen, CK Yeo, BS Lee, CT Lau - Computer Networks, 2018 - Elsevier
Abstract Low-Rate DoS (LDoS) attacks send periodical packet bursts to the bottleneck
routers which can throttle the bandwidth of TCP flows. They are difficult to detect while …
routers which can throttle the bandwidth of TCP flows. They are difficult to detect while …
Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks
Z Wu, Q Pan, M Yue, L Liu - Computer Networks, 2019 - Elsevier
TCP-targeted Low-rate Denial of Service (LDoS) attack launches periodic flows at a
sufficiently low average rate that completely spread into large network traffic at the attack …
sufficiently low average rate that completely spread into large network traffic at the attack …