DDoS‐capable IoT malwares: comparative analysis and Mirai investigation

M De Donno, N Dragoni, A Giaretta… - Security and …, 2018 - Wiley Online Library
The Internet of Things (IoT) revolution has not only carried the astonishing promise to
interconnect a whole generation of traditionally “dumb” devices, but also brought to the …

Survey of network-based defense mechanisms countering the DoS and DDoS problems

T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …

A survey on attack detection, estimation and control of industrial cyber–physical systems

D Zhang, QG Wang, G Feng, Y Shi, AV Vasilakos - ISA transactions, 2021 - Elsevier
Cyber–physical systems (CPSs) are complex systems that involve technologies such as
control, communication, and computing. Nowadays, CPSs have a wide range of applications …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

VANET security surveys

RG Engoulou, M Bellaïche, S Pierre… - Computer Communications, 2014 - Elsevier
Vehicular ad hoc networks (VANETs), a subset of Mobile Ad hoc NETworks (MANETs), refer
to a set of smart vehicles used on the road. These vehicles provide communication services …

A taxonomy of DDoS attack and DDoS defense mechanisms

J Mirkovic, P Reiher - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety
of both the attacks and the defense approaches is overwhelming. This paper presents two …

Inferring internet denial-of-service activity

D Moore, C Shannon, DJ Brown, GM Voelker… - ACM Transactions on …, 2006 - dl.acm.org
In this article, we seek to address a simple question:“How prevalent are denial-of-service
attacks in the Internet?” Our motivation is to quantitatively understand the nature of the …

Mining anomalies using traffic feature distributions

A Lakhina, M Crovella, C Diot - ACM SIGCOMM computer …, 2005 - dl.acm.org
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic
analysis methods that detect and identify a large and diverse set of anomalies. However the …

Toward the accurate identification of network applications

AW Moore, K Papagiannaki - International workshop on passive and active …, 2005 - Springer
Well-known port numbers can no longer be used to reliably identify network applications.
There is a variety of new Internet applications that either do not use well-known port …

Remote physical device fingerprinting

T Kohno, A Broido, KC Claffy - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
We introduce the area of remote physical device fingerprinting, or fingerprinting a physical
device, as opposed to an operating system or class of devices, remotely, and without the …