Search
Search Results
-
Data breaches in healthcare: security mechanisms for attack mitigation
The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting sensitive personal information. In this paper, we...
-
Email bombing attack detection and mitigation using machine learning
Email bombing, a growingly prevalent and destructive cyber attack, involves inundating a target’s email inbox with subscription confirmation messages...
-
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices
In recent times, networks have been prone to several types of attacks, such as DDoS attacks, volumetric attacks, replay attacks, eavesdrop**, etc.,...
-
Cyber attack detection and mitigation process in cloud via deep hybrid model with selected feature set
For ensuring the proper operation of CPS, it is required to obtain a solution to the security problem. Applications for cyber-physical systems (CPS)...
-
Denial-of-Service Attack Mitigation in Multi-hop 5G D2D Wireless Communication Networks Employing Double Auction Game
The advent of Fifth-Generation (5G) networks has led to the enhancement of digital connectivity throughout the world. Device-to-Device (D2D) or...
-
IoT authentication model with optimized deep Q network for attack detection and mitigation
The Internet of Things (IoT) is a promising area in day-to-day lives, like homes, health, military, and agriculture. The expansion of IoT technology...
-
“We Must Protect the Transformers”: Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models
Recently, Neural Network based Deep Learning (DL) backdoor attacks have prompted the development of mitigation mechanisms for such attacks. Out of... -
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
The Internet of Things (IoT) is an expanding field of computer networks where resource-constrained devices connect to the internet through various...
-
Customized convolutional neural network model for IoT botnet attack detection
The Internet of Things is a disruptive technology that has changed the face of many industries. On the contrary, the unpresidential growth of IoT has...
-
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models
Ensuring the security of large language models (LLMs) is an ongoing challenge despite their widespread popularity. Developers work to enhance LLMs... -
Mitigation of Distributed Denial of Service (DDoS) Attack Using Network Function Virtualization (NFV)—A Survey
One of the most damaging and widely used cyber-attacks is the Distributed Denial of Service (DDoS) attack. A large amount of attack traffic generates... -
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
Early attack detection is essential to ensure the security of complex networks, especially those in critical infrastructures. This is particularly...
-
DDoS mitigation using blockchain and machine learning techniques
Online services are vulnerable to Distributed Denial of Service (DDoS) attacks, which overwhelm target servers with malicious traffic. These attacks...
-
AI infers DoS mitigation rules
DDoS attacks still represent a severe threat to network services. While there are more or less workable solutions to defend against these attacks,...
-
Enhancing attack resilience of cyber-physical systems through state dependency graph models
This paper presents a method that utilizes graph theory and state modelling algorithms to perform automatic complexity analysis of the architecture...
-
Addressing DIO Suppression Attack in RPL based IoT Networks
The Internet of Things (IoT) has brought a revolution in technology in the last decade. IoT is susceptible to numerous internal routing attacks... -
Collaborative Blockchain Based Distributed Denial of Service Attack Mitigation Approach with IP Reputation System
Due to the high accessibility of the internet and unsecured internet-connected devices, Distributed Denial of Service attacks (DDoS) become... -
Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test
Software Defined Networking (SDN) is a network paradigm with the separation of the control plane from the data plane. Centralized management of the...
-
VANET Cluster Based Gray Hole Attack Detection and Prevention
VANET is an emerging technology for intelligent transportation systems in smart cities. Vehicle communication raises many challenges, notably in the...
-
TSWA: a unique approach to overcome interest flooding attacks in the cloud using a combination of TSW and attack detection
The prevalence of distributed denial of service (DDoS) attacks poses a significant challenge to the Internet and cloud environments, including...