T-CAD: A threshold based collaborative DDoS attack detection in multiple autonomous systems

K Singh, KS Dhindsa, D Nehra - Journal of Information Security and …, 2020 - Elsevier
DDoS attack has emerged as a security threat to the services provided by internet service
providers. The DDoS attack creates a huge danger to the availability of internet resources …

Actively Detecting Multiscale Flooding Attacks & Attack Volumes in Resource-Constrained ICPS

F Zahid, MMY Kuo, R Sinha, G Funchal… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The significant growth in modern communication technologies has led to an increase in zero-
day vulnerabilities that degrade the performance of industrial cyber-physical systems (ICPS) …

[PDF][PDF] Efficient and Secure Statistical DDoS Detection Scheme.

H Majed, HN Noura, O Salman, M Malli, A Chehab - ICETE (1), 2020 - scitepress.org
One of the hardest challenges in cybersecurity is the detection and prevention of Distributed
Denial of Service (DDoS) attacks. In this paper, a lightweight statistical approach for DDoS …

High-performance, platform-independent DDoS detection for IoT ecosystems

A Santoyo-González, C Cervelló-Pastor… - 2019 IEEE 44th …, 2019 - ieeexplore.ieee.org
Most Distributed Denial of Service (DDoS) detection and mitigation strategies for Internet of
Things (IoT) are based on a remote cloud server or purpose-built middlebox executing …

Hybrid deeper neural network model for detection of the Domain Name System over Hypertext markup language protocol traffic flooding attacks

Ö Kasim - Soft Computing, 2023 - Springer
Abstract Domain Name System flood attacks are generally carried out in the application
layer with the user datagram protocol. This type of attack is a vulnerability that concerns …

[PDF][PDF] LIGHT-WEIGHT ACTIVE SECURITY SOLUTIONS FOR RESOURCE-CONSTRAINED ICPS

F Zahid - 2023 - openrepository.aut.ac.nz
Abstract Industrial Cyber-Physical Systems (ICPS) are driving the 4th Industrial Revolution,
significantly impacting the productivity and efficiency of all sectors, including industrial …

Securing of software-defined networking (SDN) from DDoS attack using a blockchain

ME Manaa, MS Abedoun - Next Generation of Internet of Things …, 2021 - Springer
By the growth of software-defined networks (SDN), the SDN separated the switching and
routing function. It is classified in the data and control plane, respectively. In general, the …

Elektronik Sınav Sistemlerine Yönelik Siber Saldırılara Karşı Önleyici Yöntemler: LEUKOLION Örneği

D Akaslan - İstanbul Sabahattin Zaim Üniversitesi Fen Bilimleri …, 2021 - dergipark.org.tr
Yeni Koronavirüs Hastalığına karşı alınan tedbirler kapsamında ülkemizde 16 Mart 2020
tarihinden itibaren orta ve yükseköğretimde eğitim ve öğretimin mümkün olduğunca …

Elektronik sınav sistemlerine yönelik siber saldırı ve caydırıcı yöntemler: Leukolion örneği

D Akaslan - … Zaim Üniversitesi Fen Bilimleri Enstitüsü Dergisi …, 2021 - openaccess.izu.edu.tr
Yeni Koronavirüs Hastalığına karşı alınan tedbirler kapsamında ülkemizde 16 Mart 2020
tarihinden itibaren orta ve yükseköğretimde eğitim ve öğretimin mümkün olduğunca …

Performance analysis of cluster-based DDoS defense system with different reactive routing protocols

D Nehra, KS Dhindsa… - International Journal of …, 2021 - ingentaconnect.com
Background & Objective: DDoS attack poses a huge threat to the communication and
security of mobile nodes in MANETs. The number of approaches proposed to defense …