Review of recent detection methods for HTTP DDoS attack

GA Jaafar, SM Abdullah, S Ismail - Journal of Computer …, 2019 - Wiley Online Library
With increment in dependency on web technology, a commensurate increase has been
noted in destructive attempts to disrupt the essential web technologies, hence leading to …

[PDF][PDF] Distributed reflection denial of service attack: A critical review

RR Nuiaa, S Manickam… - International Journal of …, 2021 - researchgate.net
As the world becomes increasingly connected and the number of users grows exponentially
and “things” go online, the prospect of cyberspace becoming a significant target for …

Public cloud networks oriented deep neural networks for effective intrusion detection in online music education

J Zhang, JD Peter, A Shankar, W Viriyasitavat - Computers and Electrical …, 2024 - Elsevier
The rapid growth of online music education has led to increased security risks from cyber
intrusions. This paper proposes public cloud networks oriented deep neural networks for …

Effectiveness evaluation of different IDSs using integrated fuzzy MCDM model

H Alyami, MTJ Ansari, A Alharbi, W Alosaimi… - Electronics, 2022 - mdpi.com
Cyber-attacks are becoming progressively complicated; hence, the functional issues of
intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect …

A novel malware detection system based on machine learning and binary visualization

I Baptista, S Shiaeles… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The continued evolution and diversity of malware constitutes a major threat in modern
systems. It is well proven that security defenses currently available are ineffective to mitigate …

A novel online incremental learning intrusion prevention system

C Constantinides, S Shiaeles, B Ghita… - 2019 10th IFIP …, 2019 - ieeexplore.ieee.org
Attack vectors are continuously evolving in order to evade Intrusion Detection systems.
Internet of Things (IoT) environments, while beneficial for the IT ecosystem, suffer from …

The vulnerability of the production line using industrial IoT systems under ddos attack

T Horak, P Strelec, L Huraj, P Tanuska, A Vaclavova… - Electronics, 2021 - mdpi.com
Internet of Things (IoT) devices are not only finding increasing use in ordinary households,
but they have also become a key element for the Industry 4.0 concept. The implementation …

An effective mechanism to mitigate real-time DDoS attack

R Abubakar, A Aldegheishem, MF Majeed… - IEEE …, 2020 - ieeexplore.ieee.org
Computer networks are subject to an unprecedented number and variety of attack, the
majority of which are distributed denial of service (DDoS). The nature and mechanisms …

Exploratory Analysis on Current Application-Layer HTTP-Payload-Based DDoS Attack on Internet of Things (IoT) Devices

A Sharma, A Khang - Smart Cities, 2023 - taylorfrancis.com
The Internet of Things (IoT) Security has newly become a major concern and important
research topic because it directly interacts with human users. Application-layer Distributed …

Cyber resilience meta-modelling: The railway communication case study

E Bellini, S Marrone, F Marulli - Electronics, 2021 - mdpi.com
Recent times have demonstrated how much the modern critical infrastructures (eg, energy,
essential services, people and goods transportation) depend from the global communication …