[PDF][PDF] Performance evaluations of IPTables firewall solutions under DDoS attacks

M Šimon, L Huraj, M Čerňanský - Journal of Applied Mathematics …, 2015 - sciendo.com
The paper presents design, background and experimental results of the IPTables applied in
IPv4 and IP6Tables applied in IPv6 network compared through several tested parameters …

Proposal of communication standardization of industrial networks in Industry 4.0

H Igor, J Bohuslava, J Martin - 2016 IEEE 20th Jubilee …, 2016 - ieeexplore.ieee.org
This paper provides an overview of the current state of the use of Industry 4.0 standards in
real practice and deals with application problems of Smart Factory technology in various …

IoT measuring of UDP-based distributed reflective DoS attack

L Huraj, M Simon, T Horák - 2018 IEEE 16th international …, 2018 - ieeexplore.ieee.org
IoT devices and their fast growth on the Internet cause many cyber-attacks problems. The
number of compromised IoT devices can be used by DDoS (Distributed Denial of Service) …

DDoS reflection attack based on IoT: A case study

M Šimon, L Huraj, T Horák - … in Intelligent Systems: Proceedings of 7th …, 2019 - Springer
Along with the rise of Internet of Things devices the threat of adopting the IoT devices for
cyber-attacks has increased. The number of IoT devices would be more than a billion in the …

A study of DDoS reflection attack on Internet of Things in IPv4/IPv6 networks

M Šimon, L Huraj - Software Engineering Methods in Intelligent Algorithms …, 2019 - Springer
Today, many smart devices support IPv6 communication. IPv6 provides a larger address
space capable to address up to 3.4 x10 38 devices. This is the reason why IoT devices have …

Locally weighted classifiers for detection of neighbor discovery protocol distributed denial‐of‐service and replayed attacks

A Alsadhan, A Hussain, P Liatsis… - Transactions on …, 2022 - Wiley Online Library
The Internet of things requires more internet protocol (IP) addresses than IP version 4 (IPv4)
can offer. To solve this problem, IP version 6 (IPv6) was developed to expand the availability …

A mobile botnet model based on P2P grid

M Šimon, L Huraj, M Hosťovecký - … September 12-14, 2017, Proceedings 2, 2017 - Springer
Along with the rise of mobile devices the threat of adopting the mobile devices for cyber-
attacks has increased. The sheer number of smartphones would be more than a billion in …

DDoS testbed based on peer-to-peer grid

M Simon, L Huraj - 2016 International Conference on Signal …, 2016 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks and defence against them poses great
challenge in network security. Studying of DDoS mitigation strategies, understanding of …

Community cut-off attack on malicious networks

I Dirgová Luptáková, J Pospíchal - … September 12-14, 2017, Proceedings 2, 2017 - Springer
This paper aims to provide an efficient algorithm for quick disabling of known malicious
network by sequential removal or incapacitation of their nodes. The nodes are selected for …

Smart Thermostat as a Part of IoT Attack

T Horák, L Huraj - Cybernetics and Automation Control Theory Methods …, 2019 - Springer
Abstract The Internet of Things is a rapidly growing global network of devices. Due to a rapid
growth, security issues are also associated with Distributed Denial of Service attacks on …