Search
Search Results
-
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology
The increasing use of smart metering infrastructure invites security threats through trusted insiders in spite of the devices’ authentication phase....
-
Ensemble of deep reinforcement learning with optimization model for DDoS attack detection and classification in cloud based software defined networks
Distributed Denial of Service (DDoS) attacks pose a challenging threat to the availability and performance of cloud-based Software-Defined Networks...
-
WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks
Recent works have shown that the interaction between control and data plane in the Software Defined Networks can be chocked by an adversary with... -
Improved Adaptive Spiral Seagull Optimizer for Intrusion Detection and Mitigation in Wireless Sensor Network
A system that leverages blockchain technology to protect network data and provide tamper-proof administration, privacy, and intrusion detection for...
-
A black-box attack on fixed-unitary quantum encryption schemes
We show how fixed-unitary quantum encryption schemes can be attacked in a black-box setting. We use an efficient technique to invert a unitary...
-
An empirical study of attack-related events in DeFi projects development
Decentralized Finance (DeFi) offers users decentralized financial services that are associated with the security of their assets. If DeFi is...
-
A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network
AbstractSoftware Defined Networking (SDN) is a paradigm shift in the network industry with decoupling of control and data plane. This helps network...
-
Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks
The proposed Blockchain-Based Mitigation of Deauthentication Attacks (BBMDA) Framework aims to enhance the security and trustworthiness of IoT...
-
Identity Attack Vectors
An identity can be attacked by the person owning the identity or any of the related accounts and applications they are responsible for. As an attack... -
DDoS attack traffic classification in SDN using deep learning
Software-defined networking will be a critical component of the networking domain as it transitions from a standard networking design to an...
-
An Enhanced DDoS Attack Detection in Software-Defined-Networks using Ensemble Learning
The rising danger of Distributed Denial of Service (DDoS) attacks in Software-Defined Networking (SDN) environments stresses advanced detection...
-
Attack Management
Even well-secured systems can be breached. There are several reasons for this, including the complexity and dynamic nature of today’s systems,... -
FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment
With on-demand resources, flexibility, scalability, dynamic nature, and cheaper maintenance costs, cloud computing technology has revolutionized the...
-
A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks
Software Defined Networking (SDN) has become increasingly prevalent in cloud computing, Internet of Things (IoT), and various environments to...
-
Network intrusion detection and mitigation in SDN using deep learning models
Software-Defined Networking (SDN) is a contemporary network strategy utilized instead of a traditional network structure. It provides significantly...
-
Mitigation Strategies
The more we think about the cloud, the more we learn that the same challenges that existed on-premise now have morphed onto the cloud. Yes, the risk... -
E-SDNN: encoder-stacked deep neural networks for DDOS attack detection
The increasing reliance on internet-based services has heightened the vulnerability of network infrastructure to cyberattacks, particularly...
-
Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study
Cyber security encompasses a variety of financial, political, and social aspects with significant implications for the safety of individuals and...
-
An efficient DDoS attack detection mechanism in SDN environment
Traditional intrusion detection systems are insufficient to identify recent and modern sophisticated attempts with unpredictable patterns. The...
-
Secure SDN–IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach
The IoT network is unique due to heterogeneous IoT nodes and resource-constrained devices; the approach for securing IoT networks needs to be...