A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks

ST Zargar, J Joshi, D Tipper - IEEE communications surveys & …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …

Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

Enhancing medical smartphone networks via blockchain-based trust management against insider attacks

W Meng, W Li, L Zhu - IEEE Transactions on Engineering …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has gradually become one of the most important platforms across
different disciplines, by enabling dedicated physical objects to communicate with other …

Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …

Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks

W Meng, KKR Choo, S Furnell… - … on Network and …, 2018 - ieeexplore.ieee.org
The medical industry is increasingly digitalized and Internet-connected (eg, Internet of
Medical Things), and when deployed in an Internet of Medical Things environment, software …

Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data

W Meng, W Li, C Su, J Zhou, R Lu - Ieee Access, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) has been widely used in our daily life, which enables various objects
to be interconnected for data exchange, including physical devices, vehicles, and other …

[图书][B] Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures

BB Gupta, A Dahiya - 2021 - taylorfrancis.com
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are
increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource …

[PDF][PDF] Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems.

N Lutsiv, T Maksymyuk, M Beshley… - … Materials & Continua, 2022 - cdn.techscience.cn
The extensive proliferation of modern information services and ubiquitous digitization of
society have raised cybersecurity challenges to new levels. With the massive number of …

Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification

G D'Angelo, S Rampone, F Palmieri - Soft Computing, 2017 - Springer
Pervasive computing is one of the latest and more advanced paradigms currently available
in the computers arena. Its ability to provide the distribution of computational services within …

Cloud-based DDoS attacks and defenses

M Darwish, A Ouda, LF Capretz - International Conference on …, 2013 - ieeexplore.ieee.org
Safety and reliability are important in the cloud computing environment. This is especially
true today as distributed denial-of-service (DDoS) attacks constitute one of the largest …