N Bindra, M Sood - Automatic Control and Computer Sciences, 2019 - Springer
Recent trends have revealed that DDoS attacks contribute to the majority of overall network attacks. Networks face challenges in distinguishing between legitimate and malicious flows …
Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability. Despite those advantages …
M Hassaoui, M Hanini… - Journal of Computer …, 2023 - content.iospress.com
The use of command and control (C2) servers in cyberattacks has risen considerably, attackers frequently employ the domain generated algorithm (DGA) technique to conceal …
S Bhardwaj, M Dave - Wireless Personal Communications, 2022 - Springer
The exponential growth in technology observed over the past decade has introduced newer ways to exploit network and cyber-physical system-related vulnerabilities. Cybercriminals …
S Nandi, S Phadikar, K Majumder - 2020 Third ISEA …, 2020 - ieeexplore.ieee.org
In the area of cloud security, detection of DDoS attack is a challenging task such that legitimate users use the cloud resources properly. So in this paper, detection and …
Network attacks must be effectively identified and categorized to guarantee strong security. However, current techniques frequently have trouble correctly identifying and categorizing …
Sažetak In the past few years, cybersecurity is becoming very important due to the rise in internet users. The internet attacks such as Denial of service (DoS) and Distributed Denial of …
AA Ojugo, RE Yoro - International Journal of Electrical and Computer …, 2021 - academia.edu
Today's popularity of the internet has since proven an effective and efficient means of information sharing. However, this has consequently advanced the proliferation of …
Significant challenges in the areas of energy and security persist for wireless sensor networks (WSNs). Avoiding denial-of-service assaults is a priority for safeguarding WSN …