A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

A detailed investigation and analysis of using machine learning techniques for intrusion detection

P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …

A survey on security threats and countermeasures in internet of medical things (IoMT)

M Papaioannou, M Karageorgou… - Transactions on …, 2022 - Wiley Online Library
Internet of medical things (IoMT) is an emerging technology aiming to improve the patient's
quality of life by enabling personalized e‐health services without limitations on time and …

Denial of service attack detection through machine learning for the IoT

NF Syed, Z Baig, A Ibrahim, C Valli - Journal of Information and …, 2020 - Taylor & Francis
ABSTRACT Sustained Internet of Things (IoT) deployment and functioning are heavily
reliant on the use of effective data communication protocols. In the IoT landscape, the …

DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications

A Praseed, PS Thilagam - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks are some of the most devastating attacks
against Web applications. A large number of these attacks aim to exhaust the network …

Application layer denial-of-service attacks and defense mechanisms: A survey

N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …

[PDF][PDF] Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments

MAI Mallick, R Nath - World Scientific News, 2024 - worldscientificnews.com
The exponential growth in internet usage has reshaped daily transactions, prompting
individuals and companies to increasingly engage in cyberspace rather than traditional real …

Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges

K Singh, P Singh, K Kumar - Computers & security, 2017 - Elsevier
Abstract Application layer Distributed Denial of Service (DDoS) attacks have empowered
conventional flooding based DDoS with more subtle attacking methods that pose an ever …

[KNIHA][B] SCION: a secure Internet architecture

A Perrig, P Szalachowski, RM Reischuk, L Chuat - 2017 - Springer
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and **n Zhang to consider …

Slow rate denial of service attacks against HTTP/2 and detection

N Tripathi, N Hubballi - Computers & security, 2018 - Elsevier
HTTP/2 is a newly standardized protocol designed to efficiently utilize the TCP's
transmission rate and has other advantages compared to HTTP/1.1. However its threat …