DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges

KB Adedeji, AM Abu-Mahfouz, AM Kurien - Journal of Sensor and …, 2023 - mdpi.com
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …

Averaged dependence estimators for DoS attack detection in IoT networks

ZA Baig, S Sanguanpong, SN Firdous… - Future Generation …, 2020 - Elsevier
Wireless sensor networks (WSNs) have evolved to become an integral part of the
contemporary Internet of Things (IoT) paradigm. The sensor node activities of both sensing …

A DDoS attack mitigation scheme in ISP networks using machine learning based on SDN

NN Tuan, PH Hung, ND Nghia, NV Tho, TV Phan… - Electronics, 2020 - mdpi.com
Keeping Internet users protected from cyberattacks and other threats is one of the most
prominent security challenges for network operators nowadays. Among other critical threats …

Agrisecure: A fog computing-based security framework for agriculture 4.0 via blockchain

S Padhy, M Alowaidi, S Dash, M Alshehri, PP Malla… - Processes, 2023 - mdpi.com
Every aspect of the 21st century has undergone a revolution because of the Internet of
Things (IoT) and smart computing technologies. These technologies are applied in many …

Modelling smart grid IT-OT dependencies for DDoS impact propagation

D Acarali, KR Rao, M Rajarajan, D Chema… - Computers & …, 2022 - Elsevier
The traditional power network has now evolved into the smart grid, where cyber technology
enables automated control, greater efficiency, and improved stability. However, this …

An analysis study of IoT and dos attack perspective

M Jazzar, M Hamad - … of international conference on intelligent cyber …, 2022 - Springer
IoT industry is growing rapidly worldwide. Therefore, the expansion in this industry has to be
taken seriously as those IoT devices will take a huge part in our daily life. Presently, IoT …

[Retracted] DDoS Detection Using a Cloud‐Edge Collaboration Method Based on Entropy‐Measuring SOM and KD‐Tree in SDN

Y Xu, Y Yu, H Hong, Z Sun - Security and Communication …, 2021 - Wiley Online Library
Software‐defined networking (SDN) emerges as an innovative network paradigm, which
separates the control plane from the data plane to improve the network programmability and …

Method of early detection of cyber-attacks on telecommunication networks based on traffic analysis by extreme filtering

A Privalov, V Lukicheva, I Kotenko, I Saenko - Energies, 2019 - mdpi.com
The paper suggests a method of early detection of cyber-attacks by using DDoS attacks as
an example) using the method of extreme filtering in a mode close real time. The process of …

SDN-based DDoS attack mitigation scheme using convolution recursively enhanced self organizing maps

P Harikrishna, A Amuthan - Sādhanā, 2020 - Springer
In a cloud computing environment, the Distributed Denial of Service (DDoS) attack is
considered as the crucial issue that needs to be addressed in ensuring the availability of …

Calculating the Maximum Response Time of Protection Systems of Industrial Control System Network to the Impact of a DDoS Attack

AM Boger, AN Sokolov - 2023 International Russian Smart …, 2023 - ieeexplore.ieee.org
The purpose of this research is to develop a method for calculating the maximum response
time of information protection systems for networks of industrial control systems (ICS) to the …