A comprehensive study of DDoS attacks over IoT network and their countermeasures
IoT offers capabilities to gather information from digital devices, infer from their results, and
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …
DDoS attack detection and mitigation using SDN: methods, practices, and solutions
Distributed denial-of-service (DDoS) attacks have become a weapon of choice for hackers,
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …
Understanding the mirai botnet
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
A search engine backed by Internet-wide scanning
Fast Internet-wide scanning has opened new avenues for security research, ranging from
uncovering widespread vulnerabilities in random number generators to tracking the evolving …
uncovering widespread vulnerabilities in random number generators to tracking the evolving …
Distributed denial of service attacks and its defenses in IoT: a survey
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …
Bohatei: Flexible and elastic {DDoS} defense
DDoS defense today relies on expensive and proprietary hardware appliances deployed at
fixed locations. This introduces key limitations with respect to flexibility (eg, complex routing …
fixed locations. This introduces key limitations with respect to flexibility (eg, complex routing …
Network hygiene, incentives, and regulation: deployment of source address validation in the internet
The Spoofer project has collected data on the deployment and characteristics of IP source
address validation on the Internet since 2005. Data from the project comes from participants …
address validation on the Internet since 2005. Data from the project comes from participants …
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem
Denial-of-Service attacks have rapidly increased in terms of frequency and intensity, steadily
becoming one of the biggest threats to Internet stability and reliability. However, a rigorous …
becoming one of the biggest threats to Internet stability and reliability. However, a rigorous …
Delving into internet DDoS attacks by botnets: characterization and analysis
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend
against, partially due to the volatility of the attacking methods and patterns used by attackers …
against, partially due to the volatility of the attacking methods and patterns used by attackers …
Investigating system operators' perspective on security misconfigurations
C Dietrich, K Krombholz, K Borgolte… - Proceedings of the 2018 …, 2018 - dl.acm.org
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …
the exposure of private and sensitive data. The root causes for such incidents are rarely …