A comprehensive study of DDoS attacks over IoT network and their countermeasures

P Kumari, AK Jain - Computers & Security, 2023 - Elsevier
IoT offers capabilities to gather information from digital devices, infer from their results, and
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …

A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things

MK Hasan, TM Ghazal, RA Saeed… - IET …, 2022 - Wiley Online Library
The recent advancements of Internet of Things (IoT) embedded systems, wireless networks,
and biosensors those have assisted in the rapid development of implanting wearable …

[HTML][HTML] An experimental analysis of attack classification using machine learning in IoT networks

A Churcher, R Ullah, J Ahmad, S Ur Rehman… - Sensors, 2021 - mdpi.com
In recent years, there has been a massive increase in the amount of Internet of Things (IoT)
devices as well as the data generated by such devices. The participating devices in IoT …

[HTML][HTML] A survey of recommender systems for energy efficiency in buildings: Principles, challenges and prospects

Y Himeur, A Alsalemi, A Al-Kababji, F Bensaali… - Information …, 2021 - Elsevier
Recommender systems have significantly developed in recent years in parallel with the
witnessed advancements in both internet of things (IoT) and artificial intelligence (AI) …

Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB de Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

Distributed denial of service attacks and its defenses in IoT: a survey

MM Salim, S Rathore, JH Park - The Journal of Supercomputing, 2020 - Springer
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

SW Lee, M Mohammadi, S Rashidi… - Journal of Network and …, 2021 - Elsevier
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …

[HTML][HTML] Machine learning approach equipped with neighbourhood component analysis for DDoS attack detection in software-defined networking

Ö Tonkal, H Polat, E Başaran, Z Cömert, R Kocaoğlu - Electronics, 2021 - mdpi.com
The Software-Defined Network (SDN) is a new network paradigm that promises more
dynamic and efficiently manageable network architecture for new-generation networks. With …

[HTML][HTML] Federated learning for 6G-enabled secure communication systems: a comprehensive survey

D Sirohi, N Kumar, PS Rana, S Tanwar, R Iqbal… - Artificial Intelligence …, 2023 - Springer
Abstract Machine learning (ML) and Deep learning (DL) models are popular in many areas,
from business, medicine, industries, healthcare, transportation, smart cities, and many more …