Near real-time security system applied to SDN environments in IoT networks using convolutional neural network

MVO de Assis, LF Carvalho, JJPC Rodrigues… - Computers & Electrical …, 2020 - Elsevier
Abstract The Internet of Things (IoT) paradigm brings new and promising possibilities for
services and products. The heterogeneity of IoT devices highlights the inefficiency of …

[PDF][PDF] Machine learning based attacks detection and countermeasures in IoT

R Zagrouba, R Alhajri - International Journal of Communication …, 2021 - core.ac.uk
While the IoT offers important benefits and opportunities for users, the technology raises
various security issues and threats. These threats may include spreading IoT botnets …

[HTML][HTML] A critical analysis of the industrial device scanners' potentials, risks, and preventives

M Borhani, GS Gaba, J Basaez, I Avgouleas… - Journal of Industrial …, 2024 - Elsevier
Industrial device scanners allow anyone to scan devices on private networks and the
Internet. They were intended as network security tools, but they are commonly exploited as …

[PDF][PDF] SIEM-based detection and mitigation of IoT-botnet DDoS attacks

B Al-Duwairi, W Al-Kahla… - … of Electrical and …, 2020 - pdfs.semanticscholar.org
ABSTRACT The Internet of Things (IoT) is becoming an integral part of our daily life
including health, environment, homes, military, etc. The enormous growth of IoT in recent …

Improving security of web servers in critical IoT systems through self-monitoring of vulnerabilities

L Song, M García-Valls - Sensors, 2022 - mdpi.com
IoT (Internet of Things) systems are complex ones that may comprise large numbers of
sensing and actuating devices; and servers that store data and further configure the …

An Advanced Approach for performing Cyber Fraud using Banner Grabbing

K Kaushik, I Punhani, S Sharma… - 2022 5th International …, 2022 - ieeexplore.ieee.org
In this paper, the authors have discussed how cyber-attackers or hackers can do cyber fraud
or can steal information from some systems using the banner grabbing approach …

A Survey on Network Attack Surface Mapping

D Everson, L Cheng - Digital Threats: Research and Practice, 2024 - dl.acm.org
Network services are processes running on a system with network exposure. A key activity
for any network defender, penetration tester, or red team is network attack surface mapping …

Iot vulnerability scanning: a state of the art

A Amro - … , CyberICPS, SECPRE, and ADIoT, Guildford, UK …, 2020 - Springer
Our modern life becomes more and more dependent on technology and services provided
through an increasing number of deployed devices “Things” which are connected over …

An intelligent and automated WCMS vulnerability-discovery tool: the current state of the web

P Cigoj, BJ Blazic - IEEE Access, 2019 - ieeexplore.ieee.org
The main focus of the cyber-security community has been to make operating systems and
communication networks more secure and harder for attackers to penetrate. This also …

ZMap performance in open DNS resolver discovery

L Chang, K Lu, C Li, Z Zhang - 2022 2nd Asia-Pacific …, 2022 - ieeexplore.ieee.org
ZMap is a famous host discovery tool. Since open DNS resolvers (ODNSes) are a specific
concern host, ZMap is also widely used to discover ODNSes. This study investigates …