Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling

HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani - Computer Networks, 2017 - Elsevier
A recent escalation of application layer Denial of Service (DoS) attacks on the Internet has
quickly shifted the interest of the research community traditionally focused on network-based …

DDoS attack mitigation in Internet of Things using software defined networking

ME Ahmed, H Kim - … IEEE third international conference on big …, 2017 - ieeexplore.ieee.org
Securing Internet of Things (IoT) systems is a challenge because of its multiple points of
vulnerability. A spate of recent hacks and security breaches has unveiled glaring …

Bota: Explainable iot malware detection in large networks

D Uhříček, K Hynek, T Čejka… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Explainability and alert reasoning are essential but often neglected properties of intrusion
detection systems. The lack of explainability reduces security personnel's trust, limiting the …

The dark menace: Characterizing network-based attacks in the cloud

R Miao, R Potharaju, M Yu, N Jain - Proceedings of the 2015 Internet …, 2015 - dl.acm.org
As the cloud computing market continues to grow, the cloud platform is becoming an
attractive target for attackers to disrupt services and steal data, and to compromise resources …

Intrusion detection system for SDN-enabled IoT networks using machine learning techniques

J Ashraf, N Moustafa, AD Bukhshi… - 2021 IEEE 25th …, 2021 - ieeexplore.ieee.org
With the rapid increase in smart devices and lowering prices of sensing devices, adoption of
the Internet of Things (IoT) is gaining impetus. These IoT devices come with a greater threat …

Benford's law behavior of Internet traffic

L Arshadi, AH Jahangir - Journal of Network and Computer Applications, 2014 - Elsevier
In this paper, we analyze the Internet traffic from a different point of view based on Benford's
law, an empirical law that describes the distribution of leading digits in a collection of …

Hierarchical clustering based network traffic data reduction for improving suspicious flow detection

L Su, Y Yao, N Li, J Liu, Z Lu… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Attacks like APT have lasted for a long time which need suspicious flow detection on long-
time data. However, the challenge of effectively analyzing massive data source for …

[HTML][HTML] Unified smart home resource access along with authentication using Blockchain technology

A Mukherjee, M Balachandra, C Pujari, S Tiwari… - Global Transitions …, 2021 - Elsevier
Since the last decade, Smart home systems achieved popularity due to their increase in
comfort and improvement in quality life. Smart homes with the integration of Internet of …

Automated anomaly detector adaptation using adaptive threshold tuning

MQ Ali, E Al-Shaer, H Khan, SA Khayam - ACM Transactions on …, 2013 - dl.acm.org
Real-time network-and host-based Anomaly Detection Systems (ADSs) transform a
continuous stream of input data into meaningful and quantifiable anomaly scores. These …

Optimizing flow sampling for network anomaly detection

K Bartos, M Rehak, V Krmicek - 2011 7th international wireless …, 2011 - ieeexplore.ieee.org
Sampling techniques are widely employed in high-speed network traffic monitoring to allow
the analysis of high traffic volumes with limited resources. Sampling has measurable …