A survey of DDoS attacking techniques and defence mechanisms in the IoT network

R Vishwakarma, AK Jain - Telecommunication systems, 2020 - Springer
Internet-of-things has emerged out as an important invention towards employing the
tremendous power of wireless media in the real world. We can control our surroundings by …

Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

Sonata: Query-driven streaming network telemetry

A Gupta, R Harrison, M Canini, N Feamster… - Proceedings of the …, 2018 - dl.acm.org
Managing and securing networks requires collecting and analyzing network traffic data in
real time. Existing telemetry systems do not allow operators to express the range of queries …

A search engine backed by Internet-wide scanning

Z Durumeric, D Adrian, A Mirian, M Bailey… - Proceedings of the …, 2015 - dl.acm.org
Fast Internet-wide scanning has opened new avenues for security research, ranging from
uncovering widespread vulnerabilities in random number generators to tracking the evolving …

All things considered: an analysis of {IoT} devices on home networks

D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …

[HTML][HTML] An entropy-based network anomaly detection method

P Bereziński, B Jasiul, M Szpyrka - Entropy, 2015 - mdpi.com
Data mining is an interdisciplinary subfield of computer science involving methods at the
intersection of artificial intelligence, machine learning and statistics. One of the data mining …

Global measurement of {DNS} manipulation

P Pearce, B Jones, F Li, R Ensafi, N Feamster… - 26th USENIX Security …, 2017 - usenix.org
Despite the pervasive nature of Internet censorship and the continuous evolution of how and
where censorship is applied, measurements of censorship remain comparatively sparse …

Booters—An analysis of DDoS-as-a-service attacks

JJ Santanna, R van Rijswijk-Deij… - 2015 IFIP/IEEE …, 2015 - ieeexplore.ieee.org
In 2012, the Dutch National Research and Education Network, SURFnet, observed a
multitude of Distributed Denial of Service (DDoS) attacks against educational institutions …

You've got vulnerability: Exploring effective vulnerability notifications

F Li, Z Durumeric, J Czyz, M Karami, M Bailey… - 25th USENIX Security …, 2016 - usenix.org
Security researchers can send vulnerability notifications to take proactive measures in
securing systems at scale. However, the factors affecting a notification's efficacy have not …