DDoS‐capable IoT malwares: comparative analysis and Mirai investigation

M De Donno, N Dragoni, A Giaretta… - Security and …, 2018 - Wiley Online Library
The Internet of Things (IoT) revolution has not only carried the astonishing promise to
interconnect a whole generation of traditionally “dumb” devices, but also brought to the …

Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions

IA Valdovinos, JA Pérez-Díaz, KKR Choo… - Journal of Network and …, 2021 - Elsevier
Software-defined networking (SDN) is a network paradigm that decouples control and data
planes from network devices and places them into separate entities. In SDN, the controller is …

A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning

JA Perez-Diaz, IA Valdovinos, KKR Choo, D Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
While there have been extensive studies of denial of service (DoS) attacks and DDoS attack
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …

Groupchain: Towards a scalable public blockchain in fog computing of IoT services computing

K Lei, M Du, J Huang, T ** - IEEE Transactions on Services …, 2020 - ieeexplore.ieee.org
Powered by a number of smart devices distributed throughout the whole network, the
Internet of Things (IoT) is supposed to provide services computing for massive data from …

An efficient design of intelligent network data plane

G Zhou, Z Liu, C Fu, Q Li, K Xu - 32nd USENIX Security Symposium …, 2023 - usenix.org
Deploying machine learning models directly on the network data plane enables intelligent
traffic analysis at line-speed using data-driven models rather than predefined protocols …

Low-rate DoS attacks, detection, defense, and challenges: A survey

W Zhijun, L Wen**g, L Liang, Y Meng - IEEE access, 2020 - ieeexplore.ieee.org
Low-rate Denial of service (LDoS) attacks has become one of the biggest threats to the
Internet, cloud computing platforms, and big data centers. As an evolutionary species of …

[PDF][PDF] N degrees of separation: multi-dimensional separation of concerns

P Tarr, H Ossher, W Harrison, SM Sutton Jr - Proceedings of the 21st …, 1999 - dl.acm.org
Done well, separation of concerns can provide many software engineering benefits,
including reduced complexity, im-proved reusability, and simpler evolution. The choice of …

Risk taxonomy, mitigation, and assessment benchmarks of large language model systems

T Cui, Y Wang, C Fu, Y **ao, S Li, X Deng, Y Liu… - arxiv preprint arxiv …, 2024 - arxiv.org
Large language models (LLMs) have strong capabilities in solving diverse natural language
processing tasks. However, the safety and security issues of LLM systems have become the …

Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis

C Fu, Q Li, K Xu - arxiv preprint arxiv:2301.13686, 2023 - arxiv.org
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …

Vampire attacks: Draining life from wireless ad hoc sensor networks

EY Vasserman, N Hopper - IEEE transactions on mobile …, 2011 - ieeexplore.ieee.org
Ad hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of …