Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

O Osanaiye, KKR Choo, M Dlodlo - Journal of Network and Computer …, 2016 - Elsevier
Despite the increasing popularity of cloud services, ensuring the security and availability of
data, resources and services remains an ongoing research challenge. Distributed denial of …

State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions

RR Krishna, A Priyadarshini, AV Jha, B Appasani… - Sustainability, 2021 - mdpi.com
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects
that are embedded with sensors, software, and other technologies intending to connect and …

A survey and taxonomy of DoS attacks in cloud computing

M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …

Self‐similarity based DDoS attack detection using Hurst parameter

RK Deka, DK Bhattacharyya - Security and Communication …, 2016 - Wiley Online Library
Distributed denial‐of‐service attack is a serious concern in this era of voluminous Internet
world. The challenge is to find difference between distributed denial‐of‐service attack traffic …

Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems

Z Hassan, R Odarchenko, S Gnatyuk… - 2018 IEEE 5th …, 2018 - ieeexplore.ieee.org
Cloud computing has the capability of sharing and retrieving data, remote controlling from
different locations, that is why many companies and organizations implement their …

[PDF][PDF] Classification of attacks on IoT

H Damghani, L Damghani, H Hosseinian… - … computer science and …, 2019 - i4c2019.iust.ac.ir
Security is the biggest concern in adopting Internet of things technology. In particular, as the
Internet of things spreads widely, cyber-attacks are likely to become an increasingly physical …

L2Fuzz: Discovering Bluetooth L2CAP vulnerabilities using stateful fuzz testing

H Park, CK Nkuba, S Woo, H Lee - 2022 52nd Annual IEEE/IFIP …, 2022 - ieeexplore.ieee.org
Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) is a wireless technology used in
billions of devices. Recently, several Bluetooth fuzzing studies have been conducted to …

Survey on cross virtual machine side channel attack detection and properties of cloud computing as sustainable material

KE Narayana, K Jayashree - Materials Today: Proceedings, 2021 - Elsevier
Cloud computing dominates all kinds of computing in the network due to the service-
oriented and on-demand nature of the model. The customer uses a cloud model for fulfilling …

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

MS Kiraz - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
The concept of cloud computing offers measurable computational or information resources
as a service over the Internet. The major motivation behind the cloud setup is economic …