Search
Search Results
-
OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach
Software-Defined Networking (SDN) has emerged as a new architectural paradigm in computer networks, aiming to enhance network capabilities and...
-
DDoS attack forecasting based on online multiple change points detection and time series analysis
Attack forecasting is a proactive approach to defend against cyber-attacks, as it helps in predicting future threats beforehand. In this paper, we...
-
Defending Against Vishing Attacks: A Comprehensive Review for Prevention and Mitigation Techniques
Vishing attacks, or voice phishing attacks, are a type of social engineering attack in which attackers use voice communication channels, such as... -
Real-Time Mitigation of Trust-Related Attacks in Social IoT
The social Internet of Things (Social IoT) introduces novel ways to enhance IoT networks and service discovery through social contexts. However,... -
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
The adoption and popularization of mobile devices, such as smartphones and tablets, accentuated after the second decade of this century, has been...
-
Software Mitigation of RISC-V Spectre Attacks
Speculative attacks are still an active threat today that, even if initially focused on the x86 platform, reach across all modern hardware... -
Guide to develo** case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment
Critical infrastructure mainly performs its role through an industrial control system (ICS). Organizations conduct cyber exercises between red and...
-
Reflector Saturation in Amplified Reflection Denial of Service Attack Abusing CLDAP and Memcache Protocols
Amplified reflection distributed denial-of-service (AR-DDoS) attacks have been prevalent in the last ten years. AR-DDoS attacks are volumetric... -
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system
The Internet Engineering Task Force (IETF) has defined routing protocols for low power and lossy networks (RPL) for constrained devices. RPL...
-
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0
Threat models and attack graphs have been used more than 20 years by enterprises and organizations for map** the actions of potential adversaries,...
-
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN
The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein malicious nodes selectively forward certain packets while...
-
Zero-day attack detection: a systematic literature review
With the continuous increase in cyberattacks over the past few decades, the quest to develop a comprehensive, robust, and effective intrusion...
-
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation
Advanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a specific target. Often described as ’low and slow’, APTs remain...
-
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree
Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also...
-
Attack–defense tree-based analysis and optimal defense synthesis for system design
Attack–defense trees (ADTrees) are widely used in the security analysis of software systems. In this work, we introduce a novel approach to analyze...
-
An efficient centralized DDoS attack detection approach for Software Defined Internet of Things
Both software defined networks and the Internet of Things are new topics that are being heavily employed in the information technology industry and...
-
Design and implementation of Denial-of-Service attack in network of multiprocessor systems-on-chip with anomaly detection approach
IoT architecture based on the multiprocessor system-on-chip (MPSoC) is widely used because of the third-party intellectual property cores (3PIPs)...
-
Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data
When protecting the Industrial Control Systems against cyber attacks, it is important to have as much information as possible to allocate defensive...
-
Attacks on ML Systems: From Security Analysis to Attack Mitigation
The past several years have witnessed rapidly increasing use of machine learning (ML) systems in multiple industry sectors. Since security analysis...