A software-defined networking (SDN) approach to mitigating DDoS attacks

H D'Cruze, P Wang, RO Sbeit, A Ray - Information Technology-New …, 2018 - Springer
Abstract Distributed Denial of Service (DDoS) attacks are a common threat to network
security. Traditional mitigation approaches have significant limitations in addressing DDoS …

HIoTPOT: surveillance on IoT devices against recent threats

UD Gandhi, PM Kumar, R Varatharajan… - Wireless personal …, 2018 - Springer
Abstract Honeypot Internet of Things (IoT)(HIoTPOT) keep a secret eye on IoT devices and
analyzes the various recent threats which are dangerous to IoT devices. In this paper …

Using MTD and SDN-based honeypots to defend DDoS attacks in IoT

X Luo, Q Yan, M Wang, W Huang - … , Communications and IoT …, 2019 - ieeexplore.ieee.org
With the rapid development of Internet of Things (IoT), distributed denial of service (DDoS)
attacks become the important security threat of the IoT. Characteristics of IoT, such as large …

Distributed denial of service attacks detection in cloud computing using extreme learning machine

GS Kushwah, ST Ali - International Journal of …, 2019 - inderscienceonline.com
Cloud computing has become popular due to its on-demand, pay-as-you-use and
ubiquitous features. This technology suffers from various security risks. Distributed denial of …

Shield techniques for application layer DDoS attack in MANET: a methodological review

K Salunke, U Ragavendran - Wireless Personal Communications, 2021 - Springer
In today's world of wireless networks the mobile ad-hoc networks are widely preferred as a
communication medium as these are infrastructure less networks. The application layer of …

Assessment of honeypots: Issues, challenges and future directions

BB Gupta, A Gupta - International Journal of Cloud Applications and …, 2018 - igi-global.com
Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is
trapped. It is a defensive technique which lures the attacker into performing some illicit …

Cybersecurity in politics

T Marwala - Artificial intelligence, game theory and mechanism …, 2023 - Springer
This chapter delves into the delicate confluence between cybersecurity and politics, a topic
of rising importance in the digital age. Cybersecurity is no more a standalone concern; it has …

Application of computer data mining technology based on AKN algorithm in denial of service attack defense detection

X Huang - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
Denial of service attacks have become one of the most difficult network security problems
because they are easy to implement, difficult to prevent, and difficult to track, and they have …

[PDF][PDF] A hybrid honeypot framework for DDOS attacks detection and mitigation

H Melhem, Y Dayoub - 2022 - scholar.archive.org
Dependency on the internet is escalating day by day, which makes it prone to myriad
security threats, for instance phishing, SQL injection, malware and attacks. These threaten …

Game theory based modified naïve-bayes algorithm to detect DoS attacks using Honeypot

RK Shrivastava, S Ramakrishna… - 2019 IEEE 16th India …, 2019 - ieeexplore.ieee.org
The omnipresent nature of the Internet makes everything vulnerable against DoS attacks in
IoT environments. An adversary tries to mount attacks to serve his/her nefarious purposes …