DDoS attack detection and mitigation using SDN: methods, practices, and solutions

NZ Bawany, JA Shamsi, K Salah - Arabian Journal for Science and …, 2017 - Springer
Distributed denial-of-service (DDoS) attacks have become a weapon of choice for hackers,
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …

Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis

Y Meidan, M Bohadana, A Shabtai… - Proceedings of the …, 2017 - dl.acm.org
In this work we apply machine learning algorithms on network traffic data for accurate
identification of IoT devices connected to a network. To train and evaluate the classifier, we …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity

B Anderson, D McGrew - Proceedings of the 23rd ACM SIGKDD …, 2017 - dl.acm.org
The application of machine learning for the detection of malicious network traffic has been
well researched over the past several decades; it is particularly appealing when the traffic is …

BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors

W Wang, Y Shang, Y He, Y Li, J Liu - Information Sciences, 2020 - Elsevier
The Botnets have become one of the most serious threats to cyber infrastructure. Most
existing work on detecting botnets is based on flow-based traffic analysis by mining their …

Fresco: Modular composable security services for software-defined networks

SW Shin, P Porras, V Yegneswara… - 20th annual network …, 2013 - koasas.kaist.ac.kr
OpenFlow is an open standard that has gained tremendous interest in the last few years
within the network community. It is an embodiment of the software-defined networking …

IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge

I Hafeez, M Antikainen, AY Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
IoT devices are notoriously vulnerable even to trivial attacks and can be easily
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …