Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …

Internet of vehicles: concept, process, security aspects and solutions

S El Madani, S Motahhir, A El Ghzizal - Multimedia Tools and Applications, 2022 - Springer
Abstract Internet of Vehicles (IoV) is a new concept, derived from combining VANET and
Internet of Things (IoT), aiming at increasing road'user safety and reducing the number of …

REATO: REActing TO Denial of Service attacks in the Internet of Things

S Sicari, A Rizzardi, D Miorandi, A Coen-Porisini - Computer Networks, 2018 - Elsevier
Abstract Denial of Service (DoS) attack represents until now a relevant problem in Internet-
based contexts. In fact, it is both difficult to recognize and to counteract. Along with the …

A novel deep learning-based feature selection model for improving the static analysis of vulnerability detection

C Batur Şahin, L Abualigah - Neural Computing and Applications, 2021 - Springer
The automatic detection of software vulnerabilities is considered a complex and common
research problem. It is possible to detect several security vulnerabilities using static analysis …

Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data

M Jain, G Kaur - Cluster Computing, 2021 - Springer
Ever since the internet became part of the everyday lives of humans providing network
security has been considered of utmost importance. Over the years lot of time and energy …

Detecting network cyber-attacks using an integrated statistical approach

B Bouyeddou, F Harrou, B Kadri, Y Sun - Cluster Computing, 2021 - Springer
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and
safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical …

An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments

S Mahdavi Hezavehi, R Rahmani - Cluster Computing, 2020 - Springer
Today, the providers of cloud computing services are among the most prominent service
suppliers worldwide. Availability of cloud services is one of the most important concerns of …

Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor

SM Hezavehi, R Rahmani - Journal of Parallel and Distributed Computing, 2023 - Elsevier
Cloud computing environments are indispensable components of the majority of information
technology organizations and users' lives. Despite multiple benefits of cloud computing …

Intrusion detection of distributed denial of service attack in cloud

S Velliangiri, J Premalatha - Cluster Computing, 2019 - Springer
Security issue in cloud environment is one of the major obstacle in cloud implementation.
Network attacks make use of the vulnerability in the network and the protocol to damage the …

A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment

P Verma, S Tapaswi, WW Godfrey - Cluster Computing, 2021 - Springer
Abstract Distributed Denial of Service (DDoS) plays a significant role in threatening the
cloud-based services. DDoS is a kind of attack which targets the CPU, bandwidth and other …