Articles with "attack detection" as a keyword



Photo by nampoh from unsplash

Cyber-attack detection via non-linear prediction of IP addresses: an innovative big data analytics approach

Sign Up to like & get
recommendations!
Published in 2021 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-021-11390-1

Abstract: Computer network systems are often subject to several types of attacks. For example, an excessive traffic load sent to a web server for making it unusable is the main technique introduced by the Distributed Denial… read more here.

Keywords: cyber attack; address; attack detection; non linear ... See more keywords
Photo by nampoh from unsplash

Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Personal Communications"

DOI: 10.1007/s11277-021-08855-9

Abstract: Wireless sensor network occupies an inevitable role in various applications that requires data collection and transmission. The tiny wireless sensor nodes are responsible for data collection and transmission. However, these randomly deployed nodes are vulnerable… read more here.

Keywords: attack detection; detection; wireless sensor;
Photo from wikipedia

A novel centralized cloud information accountability integrity with ensemble neural network based attack detection approach for cloud data

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-01916-0

Abstract: Highly scalable services are enabled by cloud computing and easily consumed over the Internet. User data is normally stored remotely in cloud services. Users do not own or operate the machines. This is a key… read more here.

Keywords: information; attack detection; centralized cloud; cloud ... See more keywords
Photo from wikipedia

A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs

Sign Up to like & get
recommendations!
Published in 2019 at "Ad Hoc Networks"

DOI: 10.1016/j.adhoc.2019.01.010

Abstract: Abstract Vehicular Ad Hoc Networks (VANETs) are expected to play an important role in our lives. They will improve traffic safety and bring a revolution on the driving experience. However, these benefits are counterbalanced by… read more here.

Keywords: model; sybil attack; traffic; attack detection ... See more keywords
Photo from wikipedia

Attack detection in medical Internet of things using optimized deep learning: enhanced security in healthcare sector

Sign Up to like & get
recommendations!
Published in 2021 at "Drug Testing and Analysis"

DOI: 10.1108/dta-10-2020-0239

Abstract: PurposeThis paper tactics to implement the attack detection in medical Internet of things (IoT) devices using improved deep learning architecture for accomplishing the concept bring your own device (BYOD). Here, a simulation-based hospital environment is… read more here.

Keywords: attack detection; dbn; attack; goa ... See more keywords
Photo from wikipedia

An Efficient SDN-Based DDoS Attack Detection and Rapid Response Platform in Vehicular Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2854567

Abstract: With the prosperity of wireless networks, vehicular networks (VNs) have been extensively studied in recent years. It is deployed to ensure road safety, enhance the driving experience, and reduce traffic congestion. However, VNs are vulnerable… read more here.

Keywords: flow table; vehicular networks; attack detection; platform ... See more keywords
Photo from wikipedia

Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3051300

Abstract: Since Smart-Islands (SIs) with advanced cyber-infrastructure are incredibly vulnerable to cyber-attacks, increasing attention needs to be applied to their cyber-security. False data injection attacks (FDIAs) by manipulating measurements may cause wrong state estimation (SE) solutions… read more here.

Keywords: attack detection; data injection; attack; false data ... See more keywords
Photo from wikipedia

Cyber-Attack Detection and Countermeasure for Distributed Electric Springs for Smart Grid Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3145015

Abstract: With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving… read more here.

Keywords: countermeasure distributed; attack detection; cyber attack;
Photo by vita_belvita from unsplash

LSTM-based Collaborative Source-side DDoS Attack Detection

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3169616

Abstract: As denial of service attacks become more sophisticated, the source-side detection techniques are being studied to solve the limitations of target-side detection techniques such as delayed detection and difficulty in tracking attackers. Recently, some source-side… read more here.

Keywords: source side; detection; attack detection;
Photo from wikipedia

An Attack Detection Framework Based on BERT and Deep Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3185748

Abstract: Deep Learning (DL) and Natural Language Processing (NLP) techniques are improving and enriching with a rapid pace. Furthermore, we witness that the use of web applications is increasing in almost every direction in parallel with… read more here.

Keywords: information; framework based; deep learning; detection framework ... See more keywords
Photo from wikipedia

An Asynchronous Federated Learning Arbitration Model for Low-Rate DDoS Attack Detection

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3247512

Abstract: Low-rate Distributed Denial of Service (LDDoS) attacks have been one of the most notorious network security threats, which use periodic slight multi-variate time series pulse flows to degrade network quality. Limited by the poor data… read more here.

Keywords: learning arbitration; federated learning; low rate; attack detection ... See more keywords