Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Jaqen: A {High-Performance}{Switch-Native} approach for detecting and mitigating volumetric {DDoS} attacks with programmable switches

Z Liu, H Namkung, G Nikolaidis, J Lee, C Kim… - 30th USENIX Security …, 2021 - usenix.org
The emergence of programmable switches offers a new opportunity to revisit ISP-scale
defenses for volumetric DDoS attacks. In theory, these can offer better cost vs. performance …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

MLP-GA based algorithm to detect application layer DDoS attack

KJ Singh, T De - Journal of information security and applications, 2017 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is transforming into a weapon by the
attackers, politicians, and cyber terrorists, etc. Today there is a quick ascent in the …

[PDF][PDF] Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.

C Fachkha, E Bou-Harb, A Keliris, ND Memon… - NDSS, 2017 - ndss-symposium.org
Although the security of Cyber-Physical Systems (CPS) has been recently receiving
significant attention from the research community, undoubtedly, there still exists a substantial …

Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns

MS Pour, E Bou-Harb, K Varma, N Neshenko… - Digital …, 2019 - Elsevier
The resource-constrained and heterogeneous nature of Internet-of-Things (IoT) devices
coupled with the placement of such devices in publicly accessible venues complicate efforts …

Detecting Internet abuse by analyzing passive DNS traffic: A survey of implemented systems

S Torabi, A Boukhtouta, C Assi… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Despite the ubiquitous role of domain name system (DNS) in sustaining the operations of
various Internet services (domain name to IP address resolution, e-mail, Web), DNS was …

The far side of DNS amplification: tracing the DDoS attack ecosystem from the Internet core

M Nawrocki, M Jonker, TC Schmidt… - Proceedings of the 21st …, 2021 - dl.acm.org
In this paper, we shed new light on the DNS amplification ecosystem, by studying
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …

Scan, test, execute: Adversarial tactics in amplification DDoS attacks

H Griffioen, K Oosthoek, P van der Knaap… - Proceedings of the 2021 …, 2021 - dl.acm.org
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and
are generated with the help of open, unsecured services, to which an adversary sends …