A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

DDoS attacks in Industrial IoT: A survey

S Chaudhary, PK Mishra - Computer Networks, 2023 - Elsevier
As the IoT expands its influence, its effect is becoming macroscopic and pervasive. One of
the most discernible effects is in the industries where it is known as Industrial IoT (IIoT). IIoT …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

O Osanaiye, H Cai, KKR Choo… - EURASIP Journal on …, 2016 - Springer
Widespread adoption of cloud computing has increased the attractiveness of such services
to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud's …

Millions of targets under attack: a macroscopic characterization of the DoS ecosystem

M Jonker, A King, J Krupp, C Rossow… - Proceedings of the …, 2017 - dl.acm.org
Denial-of-Service attacks have rapidly increased in terms of frequency and intensity, steadily
becoming one of the biggest threats to Internet stability and reliability. However, a rigorous …

Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks

S Velliangiri, P Karthikeyan… - Journal of Experimental & …, 2021 - Taylor & Francis
Cloud computing services provide a wide range of resource pool for maintaining a large
amount of data. Cloud services are commonly used as the private or public data forum …

Hierarchical bidirectional RNN for safety-enhanced B5G heterogeneous networks

Y Xu, X Yan, Y Wu, Y Hu, W Liang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The emergence of the beyond 5G (B5G) mobile networks has provided us with a variety of
services and enriched our lives. The B5G super-heterogeneous network systems and highly …

[PDF][PDF] A survey of domain name system vulnerabilities and attacks

TH Kim, D Reeves - Journal of Surveillance, Security and …, 2020 - pdfs.semanticscholar.org
Abstract Aim: The Domain Name System (DNS) plays an integral role in the functionality of
the Internet. Clients receive Internet service by mapping domain names into internet protocol …

[PDF][PDF] Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.

C Fachkha, E Bou-Harb, A Keliris, ND Memon… - NDSS, 2017 - ndss-symposium.org
Although the security of Cyber-Physical Systems (CPS) has been recently receiving
significant attention from the research community, undoubtedly, there still exists a substantial …

DDoS never dies? An IXP perspective on DDoS amplification attacks

D Kopp, C Dietzel, O Hohlfeld - … Conference on Passive and Active Network …, 2021 - Springer
DDoS attacks remain a major security threat to the continuous operation of Internet edge
infrastructures, web services, and cloud platforms. While a large body of research focuses …