DDoS‐capable IoT malwares: comparative analysis and Mirai investigation
The Internet of Things (IoT) revolution has not only carried the astonishing promise to
interconnect a whole generation of traditionally “dumb” devices, but also brought to the …
interconnect a whole generation of traditionally “dumb” devices, but also brought to the …
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions
Software-defined networking (SDN) is a network paradigm that decouples control and data
planes from network devices and places them into separate entities. In SDN, the controller is …
planes from network devices and places them into separate entities. In SDN, the controller is …
A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning
While there have been extensive studies of denial of service (DoS) attacks and DDoS attack
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …
Groupchain: Towards a scalable public blockchain in fog computing of IoT services computing
Powered by a number of smart devices distributed throughout the whole network, the
Internet of Things (IoT) is supposed to provide services computing for massive data from …
Internet of Things (IoT) is supposed to provide services computing for massive data from …
An efficient design of intelligent network data plane
Deploying machine learning models directly on the network data plane enables intelligent
traffic analysis at line-speed using data-driven models rather than predefined protocols …
traffic analysis at line-speed using data-driven models rather than predefined protocols …
Low-rate DoS attacks, detection, defense, and challenges: A survey
W Zhijun, L Wen**g, L Liang, Y Meng - IEEE access, 2020 - ieeexplore.ieee.org
Low-rate Denial of service (LDoS) attacks has become one of the biggest threats to the
Internet, cloud computing platforms, and big data centers. As an evolutionary species of …
Internet, cloud computing platforms, and big data centers. As an evolutionary species of …
[PDF][PDF] N degrees of separation: multi-dimensional separation of concerns
P Tarr, H Ossher, W Harrison, SM Sutton Jr - Proceedings of the 21st …, 1999 - dl.acm.org
Done well, separation of concerns can provide many software engineering benefits,
including reduced complexity, im-proved reusability, and simpler evolution. The choice of …
including reduced complexity, im-proved reusability, and simpler evolution. The choice of …
Risk taxonomy, mitigation, and assessment benchmarks of large language model systems
Large language models (LLMs) have strong capabilities in solving diverse natural language
processing tasks. However, the safety and security issues of LLM systems have become the …
processing tasks. However, the safety and security issues of LLM systems have become the …
Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …
Vampire attacks: Draining life from wireless ad hoc sensor networks
Ad hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of …
pervasive computing. Prior security work in this area has focused primarily on denial of …