AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges

B Bala, S Behal - Computer science review, 2024 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks in IoT networks are one of the most
devastating and challenging cyber-attacks. The number of IoT users is growing …

SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks

P Shukla, CR Krishna, NV Patil - Cluster Computing, 2024 - Springer
In the world of connected devices, there is huge growth of less secure Internet of Things
(IoT) devices, and the ease of performing sophisticated cyberattacks using these devices …

Distributed Ensemble Method Using Deep Learning to Detect DDoS Attacks in IoT Networks

P Shukla, CR Krishna, NV Patil - Arabian Journal for Science and …, 2024 - Springer
The widespread adoption of Internet of Things (IoT) devices has increased exponentially in
recent years. Consequently, the security risks and vulnerabilities related to these unsecured …

Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions

W Owoko - World Journal of Advanced Engineering Technology …, 2024 - wjaets.com
The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats
from evolving attack vectors targeting its headers. This survey explores emerging trends in …

Kafka‐Shield: Kafka Streams‐based distributed detection scheme for IoT traffic‐based DDoS attacks

P Shukla, CR Krishna, NV Patil - Security and Privacy - Wiley Online Library
With the rapid proliferation of insecure Internet of Things (IoT) devices, the security of
Internet‐based applications and networks has become a prominent concern. One of the …

Securing the virtual marketplace: Navigating the landscape of security and privacy challenges in E-Commerce

GC Oguta - GSC Advanced Research and Reviews, 2024 - gsconlinepress.com
This paper provides a comprehensive examination of the evolving challenges and critical
considerations surrounding security and privacy within the realm of e-commerce. As the …