DDoS attack detection and mitigation using SDN: methods, practices, and solutions
Distributed denial-of-service (DDoS) attacks have become a weapon of choice for hackers,
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …
Detecting and preventing cyber insider threats: A survey
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …
security threats, the majority of which are originated by insiders. As insiders reside behind …
Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions
A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …
proliferation in the number of Internet users has presented attackers with new detrimental …
Understanding the mirai botnet
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis
In this work we apply machine learning algorithms on network traffic data for accurate
identification of IoT devices connected to a network. To train and evaluate the classifier, we …
identification of IoT devices connected to a network. To train and evaluate the classifier, we …
Realtime robust malicious traffic detection via frequency domain analysis
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …
particularly for zero-day attack detection, which is complementary to existing rule based …
Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity
The application of machine learning for the detection of malicious network traffic has been
well researched over the past several decades; it is particularly appealing when the traffic is …
well researched over the past several decades; it is particularly appealing when the traffic is …
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
The Botnets have become one of the most serious threats to cyber infrastructure. Most
existing work on detecting botnets is based on flow-based traffic analysis by mining their …
existing work on detecting botnets is based on flow-based traffic analysis by mining their …
Fresco: Modular composable security services for software-defined networks
OpenFlow is an open standard that has gained tremendous interest in the last few years
within the network community. It is an embodiment of the software-defined networking …
within the network community. It is an embodiment of the software-defined networking …
IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge
IoT devices are notoriously vulnerable even to trivial attacks and can be easily
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …