Om Kumar et al., 2019 - Google Patents
Detecting and confronting flash attacks from IoT botnets: CU Om Kumar, PRK Sathia BhamaOm Kumar et al., 2019
View PDF- Document ID
- 13381709164925591077
- Author
- Om Kumar C
- Sathia Bhama P
- Publication year
- Publication venue
- The Journal of Supercomputing
External Links
Snippet
Gone are the days when cloud providers were attacked by flash crowds causing a DoS or malware running on a very large number of servers creating a DDoS. As the number of IoT devices connected to the Internet steadily increases, the cloud faces threats of flash crowds …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Om Kumar et al. | Detecting and confronting flash attacks from IoT botnets: CU Om Kumar, PRK Sathia Bhama | |
| Wani et al. | SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL) | |
| Ur Rehman et al. | DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU) | |
| Almutairi et al. | Hybrid botnet detection based on host and network analysis | |
| Najafimehr et al. | DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy | |
| Vinayakumar et al. | Scalable framework for cyber threat situational awareness based on domain name systems data analysis | |
| Singh et al. | Botnet‐based IoT network traffic analysis using deep learning | |
| Rizvi et al. | Application of artificial intelligence to network forensics: Survey, challenges and future directions | |
| Awotunde et al. | A deep learning-based intrusion detection technique for a secured IoMT system | |
| Prasad et al. | BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web | |
| Kumar et al. | SAD-IoT: Security analysis of DDoS attacks in IoT networks | |
| Singh et al. | Big data analytics framework for peer-to-peer botnet detection using random forests | |
| Pakmehr et al. | DDoS attack detection techniques in IoT networks: a survey | |
| Zagrouba et al. | Machine learning based attacks detection and countermeasures in IoT | |
| Lysenko et al. | Self-adaptive system for the corporate area network resilience in the presence of botnet cyberattacks | |
| Diwan et al. | Feature entropy estimation (FEE) for malicious IoT traffic and detection using machine learning | |
| Wanda et al. | A survey of intrusion detection system | |
| Goyal et al. | Http botnet detection in iot devices using network traffic analysis | |
| Singh et al. | An approach of ddos attack detection using classifiers | |
| Zeleke et al. | Efficient intrusion detection system for SDN orchestrated Internet of Things | |
| US20230328081A1 (en) | System and methods for automatic detection of distributed attacks in iot devices using decentralized deep learning | |
| Alzahrani et al. | A multi-class neural network model for rapid detection of IoT botnet attacks | |
| Zaib et al. | Deep learning based cyber bullying early detection using distributed denial of service flow | |
| Muñoz et al. | A novel botnet attack detection for IoT networks based on communication graphs | |
| Mazid et al. | FL‐IDPP: A Federated Learning Based Intrusion Detection Approach With Privacy Preservation |