A comprehensive study of DDoS attacks over IoT network and their countermeasures

P Kumari, AK Jain - Computers & Security, 2023 - Elsevier
IoT offers capabilities to gather information from digital devices, infer from their results, and
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …

[HTML][HTML] A survey and analysis of intrusion detection models based on cse-cic-ids2018 big data

JL Leevy, TM Khoshgoftaar - Journal of Big Data, 2020 - Springer
The exponential growth in computer networks and network applications worldwide has been
matched by a surge in cyberattacks. For this reason, datasets such as CSE-CIC-IDS2018 …

As-ids: Anomaly and signature based ids for the internet of things

Y Otoum, A Nayak - Journal of Network and Systems Management, 2021 - Springer
Abstract The Internet of Things (IoT) is a massively extensive environment that can manage
many diverse applications. Security is critical due to potential malicious threats and the …

Machine learning approaches for combating distributed denial of service attacks in modern networking environments

A Aljuhani - IEEE Access, 2021 - ieeexplore.ieee.org
A distributed denial of service (DDoS) attack represents a major threat to service providers.
More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by …

Composite and efficient DDoS attack detection framework for B5G networks

GC Amaizu, CI Nwakanma, S Bhardwaj, JM Lee… - Computer Networks, 2021 - Elsevier
Distributed denial-of-service (DDoS) remains an ever-growing problem that has affected and
continues to affect a host of web applications, corporate bodies, and governments. With the …

[HTML][HTML] Performance issues in wireless body area networks for the healthcare application: a survey and future prospects

Q Liu, KG Mkongwa, C Zhang - SN Applied Sciences, 2021 - Springer
This study presents a survey of the current issues, application areas, findings, and
performance challenges in wireless body area networks (WBAN). The survey discusses …

A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

[HTML][HTML] Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection

D Alghazzawi, O Bamasag, H Ullah, MZ Asghar - Applied Sciences, 2021 - mdpi.com
DDoS (Distributed Denial of Service) attacks have now become a serious risk to the integrity
and confidentiality of computer networks and systems, which are essential assets in today's …

Network intrusion detection using multi-architectural modular deep neural network

R Atefinia, M Ahmadi - The Journal of Supercomputing, 2021 - Springer
The exponential growth of computer networks and the adoption of new network-based
technologies have made computer security an important challenge. With the emergence of …

[HTML][HTML] Intelligent techniques for detecting network attacks: review and research directions

M Aljabri, SS Aljameel, RMA Mohammad, SH Almotiri… - Sensors, 2021 - mdpi.com
The significant growth in the use of the Internet and the rapid development of network
technologies are associated with an increased risk of network attacks. Network attacks refer …