A comprehensive survey on network anomaly detection

G Fernandes, JJPC Rodrigues, LF Carvalho… - Telecommunication …, 2019 - Springer
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …

A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks

ST Zargar, J Joshi, D Tipper - IEEE communications surveys & …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …

Future intelligent and secure vehicular network toward 6G: Machine-learning approaches

F Tang, Y Kawamoto, N Kato, J Liu - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
As a powerful tool, the vehicular network has been built to connect human communication
and transportation around the world for many years to come. However, with the rapid growth …

A survey on attack detection, estimation and control of industrial cyber–physical systems

D Zhang, QG Wang, G Feng, Y Shi, AV Vasilakos - ISA transactions, 2021 - Elsevier
Cyber–physical systems (CPSs) are complex systems that involve technologies such as
control, communication, and computing. Nowadays, CPSs have a wide range of applications …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

Cyber security in the smart grid: Survey and challenges

W Wang, Z Lu - Computer networks, 2013 - Elsevier
The Smart Grid, generally referred to as the next-generation power system, is considered as
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …

Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): A survey

Z Shah, I Ullah, H Li, A Levula, K Khurshid - Sensors, 2022 - mdpi.com
Internet of Things (IoT) devices are widely used in many industries including smart cities,
smart agriculture, smart medical, smart logistics, etc. However, Distributed Denial of Service …

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment

BB Gupta, OP Badve - Neural Computing and Applications, 2017 - Springer
As Cloud computing is reforming the infrastructure of IT industries, it has become one of the
critical security concerns of the defensive mechanisms applied to secure Cloud …

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris, A Mitrokotsa - Computer networks, 2004 - Elsevier
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest
security problems in today's Internet. Of particular concern are Distributed Denial of Service …

Machine learning based DDoS attack detection from source side in cloud

Z He, T Zhang, RB Lee - 2017 IEEE 4th International …, 2017 - ieeexplore.ieee.org
Denial of service (DOS) attacks are a serious threat to network security. These attacks are
often sourced from virtual machines in the cloud, rather than from the attacker's own …