Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms
O Kornyo, M Asante, R Opoku, K Owusu-Agyemang… - Computers & …, 2023 - Elsevier
Abstract STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Escalation of
privilege) in advance metering infrastructure (AMI) and cloud computing have been …
privilege) in advance metering infrastructure (AMI) and cloud computing have been …
An adaptive multi-layer botnet detection technique using machine learning classifiers
In recent years, the botnets have been the most common threats to network security since it
exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been …
exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been …
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …
new developments, modern vehicles are getting increasingly astute and offering growing …
A hybrid technique to detect botnets, based on P2P traffic similarity
The botnet has been one of the most common threats to the network security since it exploits
multiple malicious codes like worm, Trojans, Rootkit, etc. These botnets are used to perform …
multiple malicious codes like worm, Trojans, Rootkit, etc. These botnets are used to perform …
Blockchain-based synergistic solution to current cybersecurity frameworks
Securing the network is a top priority for all organizations. Many high-profile breaches in the
field of cybersecurity claim to threaten the global economy. In addition to that, they impose a …
field of cybersecurity claim to threaten the global economy. In addition to that, they impose a …
Zeta: A scalable and robust {East-West} communication framework in {Large-Scale} clouds
With the broad deployment of distributed applications on clouds, the dominant volume of
traffic in cloud networks traverses in an east-west direction, flowing from server to server …
traffic in cloud networks traverses in an east-west direction, flowing from server to server …
Prioritizing vulnerability patches in large networks
We consider here the question of prioritizing the patching of security vulnerabilities to
prevent network attacks. Patching all vulnerable machines at once in large modern …
prevent network attacks. Patching all vulnerable machines at once in large modern …
A two-tier security solution for storing data across public cloud
Background: Data integrity protection in Cloud Computing becomes very challenging since
the user no longer has the possession of their own data. This makes cloud data storage …
the user no longer has the possession of their own data. This makes cloud data storage …
Towards robust multi-tenant clouds through multi-constrained VM placement
More and more tenants (enterprises and personal users) migrate their tasks to clouds since
it is a simple and low-cost way to obtain enough computing resources. However, due to …
it is a simple and low-cost way to obtain enough computing resources. However, due to …
Security integration in ddos attack mitigation using access control lists
In this article, the authors propose a DDoS mitigation system through access list-based
configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to …
configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to …