Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB de Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

Understanding the challenges and novel architectural models of multi-cloud native applications–a systematic literature review

J Alonso, L Orue-Echevarria, V Casola, AI Torre… - Journal of Cloud …, 2023 - Springer
Abstract The evolution of Cloud Computing into a service utility, along with the pervasive
adoption of the IoT paradigm, has promoted a significant growth in the need of …

A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network

EH Abualsauod - Computers and Electrical Engineering, 2022 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) offer a huge amount of potential in a variety of
applications, including healthcare, medical, traffic monitoring, military, and industry. UAVs …

Attacks against cross-chain systems and defense approaches: A contemporary survey

L Duan, Y Sun, W Ni, W Ding, J Liu… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
The blockchain cross-chain is a significant technology for inter-chain interconnection and
value transfer among different blockchain networks. Cross-chain overcomes the “information …

Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks

JB Awotunde, S Misra - Illumination of artificial intelligence in cybersecurity …, 2022 - Springer
Security has been a concern in recent years, especially in the Internet of Things (IoT) system
environment, where security and privacy are of great importance. Our lives have significantly …

[HTML][HTML] Dependable intrusion detection system using deep convolutional neural network: A novel framework and performance evaluation approach

V Hnamte, J Hussain - Telematics and Informatics Reports, 2023 - Elsevier
Intrusion detection systems (IDS) play a critical role in safeguarding computer networks
against unauthorized access and malicious activities. However, traditional IDS approaches …

Fast and accurate classifying model for denial-of-service attacks by using machine learning

MI Kareem, MN Jasim - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
A denial of service (DoS) attack is one of the dangerous threats to networks that Internet
resources and services will be less available, as they are easily operated and difficult to …

An adaptive method and a new dataset, UKM-IDS20, for the network intrusion detection system

MS Al-Daweri, S Abdullah, KAZ Ariffin - Computer Communications, 2021 - Elsevier
In recent years, the demand for computer networks has grown rapidly, thus allowing for
higher risk of novel attack incidents. Traditional network intrusion detection systems (IDSs) …

Stacking ensemble-based HIDS framework for detecting anomalous system processes in windows based operating systems using multiple word embedding

Y Kumar, B Subba - Computers & Security, 2023 - Elsevier
Globally, more than 80% of end-user devices run on Microsoft's Windows-based operating
systems. Therefore, majority of the cyber-attack payloads are crafted explicitly for exploiting …

A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario

AH Eyeleko, T Feng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
We have witnessed significant technological advancement over the past few years,
including the Internet of Things (IoT). The IoT's ability to connect consumer appliances to the …