Multiclass Classification Procedure for Detecting Attacks on MQTT‐IoT Protocol

H Alaiz-Moreton, J Aveleira-Mata… - …, 2019 - Wiley Online Library
The large number of sensors and actuators that make up the Internet of Things obliges these
systems to use diverse technologies and protocols. This means that IoT networks are more …

DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks

N Moustafa, M Keshk, KKR Choo, T Lynar… - Future Generation …, 2021 - Elsevier
There are various data management and security tools deployed at the cloud for storing and
analyzing big data generated by the Internet of Things (IoT) and Industrial IoT (IIoT) systems …

A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing

A Bonguet, M Bellaiche - Future Internet, 2017 - mdpi.com
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand
access to a shared pool of highly configurable resources (eg, networks, servers, storage …

A broker-based framework for standardization and management of Cloud Security-SLAs

T Halabi, M Bellaiche - Computers & Security, 2018 - Elsevier
Security is still one of the main barriers discouraging companies and businesses which deal
with sensitive information and confidential data from migrating toward the Cloud. Recent …

[图书][B] Distributed denial of service attacks: Real-world detection and mitigation

İ Özçelik, R Brooks - 2020 - books.google.com
Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread
and harder to control over time. This book allows students to understand how these attacks …

[PDF][PDF] A Case Study of the Impact of Denial of Service Attacks in

HF El-Sofany, SA El-Seoud… - Journal of …, 2019 - academia.edu
Pay for the service is the motto of cloud computing. It allows users to use distributed
resources in the Internet to do their computations without installing and paying for those …

An exhaustive study of DDOS attacks and DDOS datasets

JO Nehinbe, US Onyeabor - International Journal of Internet …, 2020 - inderscienceonline.com
Conceptually, frequent distributed denial of service (DDOS) attacks on corporate networks
constitute serious challenges that demand urgent explanations. Consequently, several …

A forensic analysis on the availability of MQTT network traffic

NVH Chunduri, AK Mohan - … , SSCC 2020, Chennai, India, October 14–17 …, 2021 - Springer
IoT is a diversified technology which have large scalability integrating hardware and
software components. IoT comprises of protocols that are light weight, sensors which are …

An Intranet Defense Capability Assessment Method for Network Security Solutions Based on ATT&CK Framework

Q An, Z Zhu, S Li, W Han, X Wu, S Li - International Conference on Network …, 2023 - Springer
Faced with the growing threat of intranet attacks and numerous network security solutions,
the defensive capabilities of network security solutions need to be evaluated in order to …

[PDF][PDF] The Impact Of DDOS And Ping Of Death On Network Performance

W Iftikhar, Z Mahmood, D Vistro - International Journal of Scientific …, 2019 - researchgate.net
A network's performance can be affected by a number of things. Network attacks significantly
reduce a networks performance and the most common attacks are the ping of death also …