Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

[PDF][PDF] Security of distributed intelligence in edge computing: Threats and countermeasures

MS Ansari, SH Alsamhi, Y Qiao, Y Ye… - The Cloud-to-Thing …, 2020 - library.oapen.org
Rapid growth in the amount of data produced by IoT sensors and devices has led to the
advent of edge computing wherein the data is processed at a point at or near to its origin …

Modelling behavioural dynamics for asymmetric application layer DDoS detection

A Praseed, PS Thilagam - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Asymmetric application layer DDoS attacks using computationally intensive HTTP requests
are an extremely dangerous class of attacks capable of taking down web servers with …

An OpenStack based cloud testbed framework for evaluating HTTP flooding attacks

A Dhanapal, P Nithyanandam - Wireless Networks, 2021 - Springer
The cloud computing has inherent challenges to detect the Hyper Text Transfer Protocol
(HTTP) flooding Distributed Denial of Service (DDoS) attack due to its natural characteristics …

HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach

A Praseed, PS Thilagam - Journal of Information Security and Applications, 2022 - Elsevier
Abstract Application Layer DDoS (AL-DDoS) attacks are an extremely dangerous variety of
DDoS attacks that started becoming popular recently. They are executed using very few …

Fuzzy request set modelling for detecting multiplexed asymmetric DDoS attacks on HTTP/2 servers

A Praseed, PS Thilagam - Expert Systems with Applications, 2021 - Elsevier
The introduction of HTTP/2 has led to a dramatic change in web traffic. The steady flow of
requests in HTTP/1.1 has been replaced by bursts of multiple requests, largely due to the …

[PDF][PDF] An Enhanced Intrusion Detection System for Protecting HTTP Services from Attacks.

H Al-Mimi, NA Hamad, MM Abualhaj, MS Daoud… - International Journal of …, 2023 - i-csrs.org
Cybercriminals constantly develop new sophisticated methods to breach the security of their
targets, thereby increasing cyberattack cases. HTTP is one of the earliest and most …

A new intrusion detection system based on SVM–GWO algorithms for Internet of Things

H Ghasemi, S Babaie - Wireless Networks, 2024 - Springer
Abstract Internet of Things (IoT) as an emerging technology is widely used in various
applications such as remote healthcare, smart environment, and intelligent transportation …

Wireless and Mobile Security in Edge Computing

RJ Labib, G Srivastava, JCW Lin - Security and Risk Analysis for Intelligent …, 2023 - Springer
The rapid enhancement of wireless and mobile usage in edge computing has been
increasing drastically in recent years. With the help of 5G networks, devices can now run …

Review of different encryptionand decryption techniques used for security and privacy of iot in different applications

R Hussain, I Abdullah - 2018 IEEE International Conference on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) allows different devices connected to global network or Internet for
desired application. This emerging trend of Internet of Things have been developing with …