Recent review of distributed denial of service attacks in the internet of things
H Djuitcheu, M Debes, M Aumüller… - 2022 5th conference on …, 2022 - ieeexplore.ieee.org
The use of the Internet of Things (IoT) in almost all domains nowadays makes it the network
of the future. Due to the high attention since its creation, this network is the target of …
of the future. Due to the high attention since its creation, this network is the target of …
Resistance of IoT sensors against DDoS attack in smart home environment
Smart devices along with sensors are gaining in popularity with the promise of making life
easier for the owner. As the number of sensors in an Internet of Things (IoT) system grows, a …
easier for the owner. As the number of sensors in an Internet of Things (IoT) system grows, a …
A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection
Enterprise networks that host valuable assets and services are popular and frequent targets
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …
Mitigation against DDoS attacks on an IoT-based production line using machine learning
Industry 4.0 collects, exchanges, and analyzes data during the production process to
increase production efficiency. Internet of Things (IoT) devices are among the basic …
increase production efficiency. Internet of Things (IoT) devices are among the basic …
A Comparative Analysis of High Availability for Linux Container Infrastructures
In the current era of prevailing information technology, the requirement for high availability
and reliability of various types of services is critical. This paper focusses on the comparison …
and reliability of various types of services is critical. This paper focusses on the comparison …
[HTML][HTML] Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays
One of the most common mitigations against network-borne security threats is the
deployment of firewalls, ie, systems that can observe traffic and apply rules to let it through if …
deployment of firewalls, ie, systems that can observe traffic and apply rules to let it through if …
Proposal of communication standardization of industrial networks in Industry 4.0
H Igor, J Bohuslava, J Martin - 2016 IEEE 20th Jubilee …, 2016 - ieeexplore.ieee.org
This paper provides an overview of the current state of the use of Industry 4.0 standards in
real practice and deals with application problems of Smart Factory technology in various …
real practice and deals with application problems of Smart Factory technology in various …
IoT measuring of UDP-based distributed reflective DoS attack
IoT devices and their fast growth on the Internet cause many cyber-attacks problems. The
number of compromised IoT devices can be used by DDoS (Distributed Denial of Service) …
number of compromised IoT devices can be used by DDoS (Distributed Denial of Service) …
DDoS reflection attack based on IoT: A case study
Along with the rise of Internet of Things devices the threat of adopting the IoT devices for
cyber-attacks has increased. The number of IoT devices would be more than a billion in the …
cyber-attacks has increased. The number of IoT devices would be more than a billion in the …
M-lstm: Multiclass long short-term memory based approach for detection of ddos attacks
MV Gaur, R Kumar - Mathematical Statistician and Engineering …, 2022 - philstat.org
Abstract Distributed Denial of Service attack is a ubiquitous menace to computer networks.
In this attack, several nodes attack the server by sending huge amount of traffic. Server in …
In this attack, several nodes attack the server by sending huge amount of traffic. Server in …