[go: up one dir, main page]

Om Kumar et al., 2019 - Google Patents

Detecting and confronting flash attacks from IoT botnets: CU Om Kumar, PRK Sathia Bhama

Om Kumar et al., 2019

View PDF
Document ID
13381709164925591077
Author
Om Kumar C
Sathia Bhama P
Publication year
Publication venue
The Journal of Supercomputing

External Links

Snippet

Gone are the days when cloud providers were attacked by flash crowds causing a DoS or malware running on a very large number of servers creating a DDoS. As the number of IoT devices connected to the Internet steadily increases, the cloud faces threats of flash crowds …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Om Kumar et al. Detecting and confronting flash attacks from IoT botnets: CU Om Kumar, PRK Sathia Bhama
Wani et al. SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
Ur Rehman et al. DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)
Almutairi et al. Hybrid botnet detection based on host and network analysis
Najafimehr et al. DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy
Vinayakumar et al. Scalable framework for cyber threat situational awareness based on domain name systems data analysis
Singh et al. Botnet‐based IoT network traffic analysis using deep learning
Rizvi et al. Application of artificial intelligence to network forensics: Survey, challenges and future directions
Awotunde et al. A deep learning-based intrusion detection technique for a secured IoMT system
Prasad et al. BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web
Kumar et al. SAD-IoT: Security analysis of DDoS attacks in IoT networks
Singh et al. Big data analytics framework for peer-to-peer botnet detection using random forests
Pakmehr et al. DDoS attack detection techniques in IoT networks: a survey
Zagrouba et al. Machine learning based attacks detection and countermeasures in IoT
Lysenko et al. Self-adaptive system for the corporate area network resilience in the presence of botnet cyberattacks
Diwan et al. Feature entropy estimation (FEE) for malicious IoT traffic and detection using machine learning
Wanda et al. A survey of intrusion detection system
Goyal et al. Http botnet detection in iot devices using network traffic analysis
Singh et al. An approach of ddos attack detection using classifiers
Zeleke et al. Efficient intrusion detection system for SDN orchestrated Internet of Things
US20230328081A1 (en) System and methods for automatic detection of distributed attacks in iot devices using decentralized deep learning
Alzahrani et al. A multi-class neural network model for rapid detection of IoT botnet attacks
Zaib et al. Deep learning based cyber bullying early detection using distributed denial of service flow
Muñoz et al. A novel botnet attack detection for IoT networks based on communication graphs
Mazid et al. FL‐IDPP: A Federated Learning Based Intrusion Detection Approach With Privacy Preservation