Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

Data collection for attack detection and security measurement in mobile ad hoc networks: A survey

G Liu, Z Yan, W Pedrycz - Journal of Network and Computer Applications, 2018 - Elsevier
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …

Scalable traffic sampling using centrality measure on software-defined networks

S Yoon, T Ha, S Kim, H Lim - IEEE Communications Magazine, 2017 - ieeexplore.ieee.org
With regard to cyber security, pervasive traffic visibility is one of the most essential
functionalities for complex network systems. A traditional network system has limited access …

Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense

M Korczynski, A Hamieh, JH Huh… - IEEE …, 2016 - ieeexplore.ieee.org
Social insect colonies have survived over evolutionary time in part due to the success of
their collaborative methods: using local information and distributed decision making …

Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol

K Geetha, N Sreenath - Arabian Journal for Science and Engineering, 2016 - Springer
Mobile ad hoc networks (MANETs) play a vital role in ubiquitous computing. Multimedia
communication is the main aspect of MANETs in emergency networks. Security is the major …

An experimental study on the applicability of SYN cookies to networked constrained devices

JJ Echevarria, P Garaizar… - Software: Practice and …, 2018 - Wiley Online Library
The Internet protocol suite is increasingly used on devices with constrained resources that
operate as both clients and servers within the Internet of Things paradigm. However, these …

Spark-based port and net scan detection

A Affinito, A Botta, L Gallo, M Garofalo… - Proceedings of the 35th …, 2020 - dl.acm.org
Network security is more and more important today. Port and net scan are the typical
preliminary steps an attacker makes to find victims in a certain network, and are currently the …

[PDF][PDF] An adaptive SYN flooding attack mitigation in DDOS environment

K Hussain, SJ Hussain, V Dillshad… - … Journal of Computer …, 2016 - researchgate.net
A honeypot being an information security server attract the hackers towards it by showing
open ports and services and monitor network traffic closely by playing some key feature …

Evasion of port scan detection in zeek and snort and its mitigation

G Barbour, A McDonald… - ECCWS 2021 20th …, 2021 - books.google.com
East-west cyberattacks typically scan for open TCP ports on local network hosts in order to
identify vulnerable services for subsequent exploitation. Since TCP port scans do not appear …

Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction

H Li, Y Zhao, W Yao, K Xu, Q Li - Science China Information Sciences, 2023 - Springer
Distributed denial of service (DDoS) detection is still an open and challenging problem. In
particular, sophisticated attacks, eg, attacks that disguise attack packets as benign traffic …