Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques

M Gelgi, Y Guan, S Arunachala, M Samba Siva Rao… - Sensors, 2024 - mdpi.com
Internet of Things (IoT) technology has become an inevitable part of our daily lives. With the
increase in usage of IoT Devices, manufacturers continuously develop IoT technology …

A Survey of Vulnerability Detection Techniques by Smart Contract Tools

ZA Khan, AS Namin - IEEE Access, 2024 - ieeexplore.ieee.org
Ethereum Blockchain technology introduced a competitive environment in the financial
sector. Consequently, new technologies emerged, such as Smart Contracts (SCs), which …

Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator

I Obaidat, B Kahn, F Tavakoli… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
DDoSim, a simulation testbed for mimicking real-world, large-scale botnet DDoS attacks, is
presented. DDoSim offers various capabilities, including running user-specified software …

Dynamic Analysis for Detection of Self-Destructive Smart Contracts

ZA Khan, AS Namin - 2023 IEEE 47th Annual Computers …, 2023 - ieeexplore.ieee.org
Research in Ethereum BlockChain has resulted in the growth of several tools for
vulnerability detection. As a typical example, the Vandal tool detects selfdestruct …

A Communication-Efficient, Privacy-Preserving Federated Learning Algorithm Based on Two-Stage Gradient Pruning and Differentiated Differential Privacy

Y Li, W Du, L Han, Z Zhang, T Liu - Sensors, 2023 - mdpi.com
There are several unsolved problems in federated learning, such as the security concerns
and communication costs associated with it. Differential privacy (DP) offers effective privacy …

Evolutionary Equilibrium of Mining Pools Under DDoS Attack in Blockchain System

X Liu, Z Huang, Q Wang - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Consensus algorithm is widely used in blockchain system, which can solve the problems of
fault tolerance, consensus and security. Proof-of-work (PoW) algorithm is one of the most …

A Detection and Response Architecture for Stealthy Attacks on Cyber-Physical Systems

T Shawly - JOIV: International Journal on Informatics Visualization, 2023 - joiv.org
There has been an increased reliance on interconnected Cyber-Physical Systems (CPS)
applications. This reliance has caused tremendous growth in high assurance challenges …

An Efficient DDoS Attack Detection using Attention based Hybrid Model in Blockchain based SDN-IoT

PP Pawar, D Kumar, B Ananthan… - … For Internet of …, 2024 - ieeexplore.ieee.org
Due to the advancement of IoT (Internet of Things) has created a new technology and
enhanced modelling capabilities, contributing to the evolution of modern standards of living …

A Machine Learning Approach for DDoS Attack Detection in CIC-DDoS2019 Dataset Using Multiple Linear Regression Algorithm

L Gondi, S Sambangi, PK Priya, SS Anjum - XVIII International Conference …, 2023 - Springer
In the context of cloud computing, distributed denial-of-service (DDoS) attacks are malicious
attempts to overwhelm a cloud service, network, or an application with a huge flow of traffic …

Detección de fraude en transacciones Blockchain usando procesos de Machine Learning, una Aproximación al Estado del Arte.

R Ocaña, I Agudo-Ruiz, FJ López-Muñoz - 2023 - riuma.uma.es
Las aplicaciones financieras basadas en tecnología blockchain son cada vez más comunes
en el día a día de la economía regulada global. Con este precedente, y en una …