Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB de Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

[HTML][HTML] Understanding the challenges and novel architectural models of multi-cloud native applications–a systematic literature review

J Alonso, L Orue-Echevarria, V Casola, AI Torre… - Journal of Cloud …, 2023 - Springer
Abstract The evolution of Cloud Computing into a service utility, along with the pervasive
adoption of the IoT paradigm, has promoted a significant growth in the need of …

Attacks against cross-chain systems and defense approaches: A contemporary survey

L Duan, Y Sun, W Ni, W Ding, J Liu… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
The blockchain cross-chain is a significant technology for inter-chain interconnection and
value transfer among different blockchain networks. Cross-chain overcomes the “information …

[HTML][HTML] Dependable intrusion detection system using deep convolutional neural network: A novel framework and performance evaluation approach

V Hnamte, J Hussain - Telematics and Informatics Reports, 2023 - Elsevier
Intrusion detection systems (IDS) play a critical role in safeguarding computer networks
against unauthorized access and malicious activities. However, traditional IDS approaches …

Stacking ensemble-based HIDS framework for detecting anomalous system processes in windows based operating systems using multiple word embedding

Y Kumar, B Subba - Computers & Security, 2023 - Elsevier
Globally, more than 80% of end-user devices run on Microsoft's Windows-based operating
systems. Therefore, majority of the cyber-attack payloads are crafted explicitly for exploiting …

A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario

AH Eyeleko, T Feng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
We have witnessed significant technological advancement over the past few years,
including the Internet of Things (IoT). The IoT's ability to connect consumer appliances to the …

Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks

MA Ribeiro, MSP Fonseca, J de Santi - Computers & Security, 2023 - Elsevier
Abstract The Distributed Denial of Service (DDoS) coordinates synchronized attacks on
systems on the Internet using a set of infected hosts (bots). Bots are programmed to attack a …

Use of machine learning for Web Denial-of-service attacks: a multivocal literature review

M Ayub, O Lajam, A Alnajim, M Niazi - Arabian Journal for Science and …, 2023 - Springer
Abstract Denial-of-service (DoS) attacks conducted on online systems cause the targeted
resources to become inoperative. This is caused by the abnormal traffic intentionally …

A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection

M Lyu, HH Gharakheili, V Sivaraman - arXiv preprint arXiv:2306.16675, 2023 - arxiv.org
Enterprise networks that host valuable assets and services are popular and frequent targets
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …

[HTML][HTML] ReinforSec: an automatic generator of synthetic malware samples and denial-of-service attacks through reinforcement learning

A Hernandez-Suarez, G Sanchez-Perez… - Sensors, 2023 - mdpi.com
In recent years, cybersecurity has been strengthened through the adoption of processes,
mechanisms and rapid sources of indicators of compromise in critical areas. Among the …