We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 5,884 results
  1. Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology

    The increasing use of smart metering infrastructure invites security threats through trusted insiders in spite of the devices’ authentication phase....

    Jaya Singh, Ayush Sinha, ... Om Prakash Vyas in International Journal of Information Security
    Article 21 September 2021
  2. Ensemble of deep reinforcement learning with optimization model for DDoS attack detection and classification in cloud based software defined networks

    Distributed Denial of Service (DDoS) attacks pose a challenging threat to the availability and performance of cloud-based Software-Defined Networks...

    Kiran Kumar Paidipati, Chinnarao Kurangi, ... S. Nithinsha in Multimedia Tools and Applications
    Article 21 September 2023
  3. WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks

    Recent works have shown that the interaction between control and data plane in the Software Defined Networks can be chocked by an adversary with...
    Neminath Hubballi, Kanishk Patel in Information Systems Security
    Conference paper 2022
  4. Improved Adaptive Spiral Seagull Optimizer for Intrusion Detection and Mitigation in Wireless Sensor Network

    A system that leverages blockchain technology to protect network data and provide tamper-proof administration, privacy, and intrusion detection for...

    Swathi Darla, C. Naveena in SN Computer Science
    Article 04 April 2024
  5. A black-box attack on fixed-unitary quantum encryption schemes

    We show how fixed-unitary quantum encryption schemes can be attacked in a black-box setting. We use an efficient technique to invert a unitary...

    Cezary Pilaszewicz, Lea R. Muth, Marian Margraf in Discover Computing
    Article Open access 22 June 2024
  6. An empirical study of attack-related events in DeFi projects development

    Decentralized Finance (DeFi) offers users decentralized financial services that are associated with the security of their assets. If DeFi is...

    Dongming **ang, Yuanchang Lin, ... Yang Liu in Empirical Software Engineering
    Article 23 February 2024
  7. A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network

    Abstract

    Software Defined Networking (SDN) is a paradigm shift in the network industry with decoupling of control and data plane. This helps network...

    Avtar Singh, Harpreet Kaur, Navjot Kaur in Cluster Computing
    Article 17 October 2023
  8. Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks

    The proposed Blockchain-Based Mitigation of Deauthentication Attacks (BBMDA) Framework aims to enhance the security and trustworthiness of IoT...

    S. Harihara Gopalan, A. Manikandan, ... G. Sujatha in International Journal of Networked and Distributed Computing
    Article Open access 28 May 2024
  9. Identity Attack Vectors

    An identity can be attacked by the person owning the identity or any of the related accounts and applications they are responsible for. As an attack...
    Morey J. Haber, Darran Rolls in Identity Attack Vectors
    Chapter 2024
  10. DDoS attack traffic classification in SDN using deep learning

    Software-defined networking will be a critical component of the networking domain as it transitions from a standard networking design to an...

    Nisha Ahuja, Debajyoti Mukhopadhyay, Gaurav Singal in Personal and Ubiquitous Computing
    Article 24 January 2024
  11. An Enhanced DDoS Attack Detection in Software-Defined-Networks using Ensemble Learning

    The rising danger of Distributed Denial of Service (DDoS) attacks in Software-Defined Networking (SDN) environments stresses advanced detection...

    Saumitra Chattopadhyay, Ashok Kumar Sahoo, Sanjay Jasola in SN Computer Science
    Article 23 May 2024
  12. Attack Management

    Even well-secured systems can be breached. There are several reasons for this, including the complexity and dynamic nature of today’s systems,...
    Elisa Bertino, Sonam Bhardwaj, ... Ashraf Y. Mahgoub in Machine Learning Techniques for Cybersecurity
    Chapter 2023
  13. FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment

    With on-demand resources, flexibility, scalability, dynamic nature, and cheaper maintenance costs, cloud computing technology has revolutionized the...

    Animesh Kumar, Sandip Dutta, Prashant Pranav in International Journal of Information Technology
    Article 18 October 2023
  14. A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks

    Software Defined Networking (SDN) has become increasingly prevalent in cloud computing, Internet of Things (IoT), and various environments to...

    Ankit Kumar Jain, Hariom Shukla, Diksha Goel in Cluster Computing
    Article 22 June 2024
  15. Network intrusion detection and mitigation in SDN using deep learning models

    Software-Defined Networking (SDN) is a contemporary network strategy utilized instead of a traditional network structure. It provides significantly...

    Mamatha Maddu, Yamarthi Narasimha Rao in International Journal of Information Security
    Article 29 October 2023
  16. Mitigation Strategies

    The more we think about the cloud, the more we learn that the same challenges that existed on-premise now have morphed onto the cloud. Yes, the risk...
    Morey J. Haber, Brian Chappell, Christopher Hills in Cloud Attack Vectors
    Chapter 2022
  17. E-SDNN: encoder-stacked deep neural networks for DDOS attack detection

    The increasing reliance on internet-based services has heightened the vulnerability of network infrastructure to cyberattacks, particularly...

    Emna Benmohamed, Adel Thaljaoui, ... Mansor Alohali in Neural Computing and Applications
    Article 12 March 2024
  18. Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study

    Cyber security encompasses a variety of financial, political, and social aspects with significant implications for the safety of individuals and...

    Hüseyin Ünözkan, Mehmet Ertem, Salaheddine Bendak in Network Modeling Analysis in Health Informatics and Bioinformatics
    Article 16 November 2022
  19. An efficient DDoS attack detection mechanism in SDN environment

    Traditional intrusion detection systems are insufficient to identify recent and modern sophisticated attempts with unpredictable patterns. The...

    Vanlalruata Hnamte, Jamal Hussain in International Journal of Information Technology
    Article 13 June 2023
  20. Secure SDN–IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach

    The IoT network is unique due to heterogeneous IoT nodes and resource-constrained devices; the approach for securing IoT networks needs to be...

    Mimi Cherian, Satishkumar L. Varma in Journal of Network and Systems Management
    Article 17 June 2023
Did you find what you were looking for? Share feedback.