Protecting RESTful IoT devices from battery exhaustion DoS attacks

S Hristozov, M Huber, G Sigl - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
attack detection algorithm is executed on per Requester basis on the Backend. For the formal
… EWMA algorithms for detecting and throttling battery exhaustion attacks through simulation…

Automating the early detection of security design flaws

K Tuma, L Sion, R Scandariato, K Yskout - … Conference on Model Driven …, 2020 - dl.acm.org
… [9] introduce a catalog of so called ‘spoiled patterns’ and automatically detect them in
architecture models. To this aim, they extend an existing OWL ontology. Their approach suggests …

[HTML][HTML] Automatic verification and execution of cyber attack on iot devices

FL Færøy, MM Yamin, A Shukla, B Katt - Sensors, 2023 - mdpi.com
… Comparing to the above mentioned work in our study we first formally model and verify
different IoT threats and then automatically execute the attack on IoT devices with minimal human …

Modelling load-changing attacks in cyber-physical systems

L Arnaboldi, RM Czekster, C Morisset… - Electronic Notes in …, 2020 - Elsevier
… We showcase our modelling approach in the scenario of a power supplier (eg power plant)
… We demonstrate how our modelling approach can quantify the impact of a botnet attack and …

Survey of transient execution attacks and their mitigations

W Xiong, J Szefer - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
… transient execution attacks and uses them to evaluate the feasibility of the different attacks.
This survey especially considers both existing attacks and potential new attacks suggested by …

Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach

Q Zou, A Singhal, X Sun, P Liu - Journal of computer security, 2022 - content.iospress.com
… ; 2) We propose to use protocol fuzzing to automatically generate high-quality network traffic
… is resource exhaustion DoS attacks. The network traffic can be used to detect such attacks, …

Heterogeneous Event Causal Dependency Definition for the Detection and Explanation of Multi-Step Attacks

C Xosanavongsa - 2020 - theses.hal.science
… Anomaly detection techniques proceed in two stages: 1) design of a set of models of reference
representing the legitimate behavior; 2) automatic detection of deviant behaviors accord…

Towards formal verification of IoT protocols: A Review

K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
… Battery Exhaustion attack: In order to communicate with the application server field devices
connect from time to time with the application server. Depending on the protocol there are …

A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection

M Lyu, HH Gharakheili, V Sivaraman - IEEE Access, 2024 - ieeexplore.ieee.org
… ] develops machine learning models to detect slow-rate DDoS such as slow HTTP attacks. It
… oping high-accuracy models and algorithms to detect specific types of attacks. These efforts …

A framework for intelligent DDoS attack detection and response using SIEM and ontology

SD Çakmakçı, H Hutschenreuter… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
… We model explicit knowledge of an IT-dependent organization at a high-level using … unwanted
traffic and resource exhaustion consumes a noticeable amount of resources. Both types of …