DDoS‐capable IoT malwares: comparative analysis and Mirai investigation

M De Donno, N Dragoni, A Giaretta… - Security and …, 2018 - Wiley Online Library
The Internet of Things (IoT) revolution has not only carried the astonishing promise to
interconnect a whole generation of traditionally “dumb” devices, but also brought to the …

Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions

IA Valdovinos, JA Pérez-Díaz, KKR Choo… - Journal of Network and …, 2021 - Elsevier
Software-defined networking (SDN) is a network paradigm that decouples control and data
planes from network devices and places them into separate entities. In SDN, the controller is …

A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning

JA Perez-Diaz, IA Valdovinos, KKR Choo, D Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
While there have been extensive studies of denial of service (DoS) attacks and DDoS attack
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …

Groupchain: Towards a scalable public blockchain in fog computing of IoT services computing

K Lei, M Du, J Huang, T Jin - IEEE Transactions on Services …, 2020 - ieeexplore.ieee.org
Powered by a number of smart devices distributed throughout the whole network, the
Internet of Things (IoT) is supposed to provide services computing for massive data from …

[PDF][PDF] N degrees of separation: multi-dimensional separation of concerns

P Tarr, H Ossher, W Harrison, SM Sutton Jr - Proceedings of the 21st …, 1999 - dl.acm.org
Done well, separation of concerns can provide many software engineering benefits,
including reduced complexity, im-proved reusability, and simpler evolution. The choice of …

Low-rate DoS attacks, detection, defense, and challenges: a survey

W Zhijun, L Wenjing, L Liang, Y Meng - IEEE access, 2020 - ieeexplore.ieee.org
Low-rate Denial of service (LDoS) attacks has become one of the biggest threats to the
Internet, cloud computing platforms, and big data centers. As an evolutionary species of …

Vampire attacks: draining life from wireless ad hoc sensor networks

EY Vasserman, N Hopper - IEEE transactions on mobile …, 2011 - ieeexplore.ieee.org
Ad hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of …

SkyShield: A sketch-based defense system against application layer DDoS attacks

C Wang, TTN Miu, X Luo, J Wang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Application layer distributed denial of service (DDoS) attacks have become a severe threat
to the security of web servers. These attacks evade most intrusion prevention systems by …

An efficient design of intelligent network data plane

G Zhou, Z Liu, C Fu, Q Li, K Xu - 32nd USENIX Security Symposium …, 2023 - usenix.org
Deploying machine learning models directly on the network data plane enables intelligent
traffic analysis at line-speed using data-driven models rather than predefined protocols …

GASF-IPP: Detection and mitigation of LDoS attack in SDN

D Tang, S Wang, B Liu, W Jin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Software defined networking (SDN), a highly regarded architecture, enhances the
programmability and manageability of the network by decoupling the data plane and the …