Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

Deep learning-based DDoS-attack detection for cyber–physical system over 5G network

B Hussain, Q Du, B Sun, Z Han - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the advent of 5G, cyber–physical systems (CPSs) employed in the vertical industries
and critical infrastructures will depend on the cellular network more than ever; making their …

Survey on threats and attacks on mobile networks

S Mavoungou, G Kaddoum, M Taha, G Matar - IEEE Access, 2016 - ieeexplore.ieee.org
Since the 1G of mobile technology, mobile wireless communication systems have continued
to evolve, bringing into the network architecture new interfaces and protocols, as well as …

LTE/LTE-A network security data collection and analysis for security measurement: A survey

L He, Z Yan, M Atiquzzaman - IEEE Access, 2018 - ieeexplore.ieee.org
The long-term evolution (LTE)/LTE-advanced (LTE-A) network provides advanced services
for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency …

Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model

J Bang, YJ Cho, K Kang - Computers & Security, 2017 - Elsevier
LTE signaling attack is a serious threat to a wireless sensor and actuator network whose
facilities are dispersed and connected with LTE technology on a large scale, in order to …

Machine learning based signaling ddos detection system for 5g stand alone core network

S Park, B Cho, D Kim, I You - Applied Sciences, 2022 - mdpi.com
Research to deal with distributed denial of service (DDoS) attacks was kicked off from long
ago and has seen technological advancement along with an extensive 5G footprint. Prior …

Mobile network anomaly detection and mitigation: The NEMESYS approach

OH Abdelrahman, E Gelenbe, G Görbil… - Information sciences and …, 2013 - Springer
Mobile malware and mobile network attacks are becoming a significant threat that
accompanies the increasing popularity of smart phones and tablets. Thus in this paper we …

Survey of DoS Attacks on LTE infrastructure used in AMI System and Countermeasures

K Pedramnia, M Rahmani - 2018 Smart Grid Conference (SGC), 2018 - ieeexplore.ieee.org
Smart grid as a cyber-physical infrastructure is vulnerable to a wide variety of attacks. In the
smart grid applications, it is essential to investigate attack detection and mitigation methods …

Security awareness in software-defined multi-domain 5G networks

J Suomalainen, K Ahola, M Majanen, O Mämmelä… - Future Internet, 2018 - mdpi.com
Fifth generation (5G) technologies will boost the capacity and ease the management of
mobile networks. Emerging virtualization and softwarization technologies enable more …

DDoS attacks in experimental LTE networks

J Feng, BK Hong, SM Cheng - … : Proceedings of the Workshops of the 34th …, 2020 - Springer
The infamous distributed denial-of-service (DDoS) cyberattack in which attackers aim to
disrupt normal services provided by one or more servers over the Internet based on …