Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms

O Kornyo, M Asante, R Opoku, K Owusu-Agyemang… - Computers & …, 2023 - Elsevier
Abstract STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Escalation of
privilege) in advance metering infrastructure (AMI) and cloud computing have been …

An adaptive multi-layer botnet detection technique using machine learning classifiers

RU Khan, X Zhang, R Kumar, A Sharif, NA Golilarz… - Applied Sciences, 2019 - mdpi.com
In recent years, the botnets have been the most common threats to network security since it
exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been …

Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses

AA Elkhail, RUD Refat, R Habre, A Hafeez… - IEEE …, 2021 - ieeexplore.ieee.org
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …

A hybrid technique to detect botnets, based on P2P traffic similarity

RU Khan, R Kumar, M Alazab… - 2019 Cybersecurity and …, 2019 - ieeexplore.ieee.org
The botnet has been one of the most common threats to the network security since it exploits
multiple malicious codes like worm, Trojans, Rootkit, etc. These botnets are used to perform …

Blockchain-based synergistic solution to current cybersecurity frameworks

SK Yadav, K Sharma, C Kumar, A Arora - Multimedia Tools and …, 2022 - Springer
Securing the network is a top priority for all organizations. Many high-profile breaches in the
field of cybersecurity claim to threaten the global economy. In addition to that, they impose a …

Zeta: A scalable and robust {East-West} communication framework in {Large-Scale} clouds

Q Zhang, G Zhao, H Xu, Z Yu, L Xie, Y Zhao… - … USENIX Symposium on …, 2022 - usenix.org
With the broad deployment of distributed applications on clouds, the dominant volume of
traffic in cloud networks traverses in an east-west direction, flowing from server to server …

Prioritizing vulnerability patches in large networks

A Olswang, T Gonda, R Puzis, G Shani… - Expert Systems with …, 2022 - Elsevier
We consider here the question of prioritizing the patching of security vulnerabilities to
prevent network attacks. Patching all vulnerable machines at once in large modern …

A two-tier security solution for storing data across public cloud

K Sharma, F Rafiqui, P Attri… - Recent Patents on …, 2019 - ingentaconnect.com
Background: Data integrity protection in Cloud Computing becomes very challenging since
the user no longer has the possession of their own data. This makes cloud data storage …

Towards robust multi-tenant clouds through multi-constrained VM placement

Y Zhai, G Zhao, H Xu, Y Zhao, J Liu… - 2021 IEEE/ACM 29th …, 2021 - ieeexplore.ieee.org
More and more tenants (enterprises and personal users) migrate their tasks to clouds since
it is a simple and low-cost way to obtain enough computing resources. However, due to …

Security integration in ddos attack mitigation using access control lists

SK Yadav, K Sharma, A Arora - International Journal of Information …, 2018 - igi-global.com
In this article, the authors propose a DDoS mitigation system through access list-based
configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to …