Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2854567
Abstract: With the prosperity of wireless networks, vehicular networks (VNs) have been extensively studied in recent years. It is deployed to ensure road safety, enhance the driving experience, and reduce traffic congestion. However, VNs are vulnerable…
read more here.
Keywords:
flow table;
vehicular networks;
attack detection;
platform ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2896783
Abstract: Software-defined networking (SDN) is the key outcome of extensive research efforts over the past few decades toward transforming the Internet infrastructure to be more programmable, configurable, and manageable. However, critical cyber-threats in the SDN-based cloud…
read more here.
Keywords:
based cloud;
ddos attack;
sdn based;
service ... See more keywords
Photo by noaa from unsplash
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3021435
Abstract: While software defined network (SDN) brings more innovation to the development of future networks, it also faces a more severe threat from DDoS attacks. In order to deal with the single point of failure on…
read more here.
Keywords:
detection defense;
ddos attacks;
sdn environment;
ddos attack ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3182818
Abstract: In an application-layer distributed denial of service (App-DDoS) attack, zombie computers bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot identify these requests since they have legal forms of standard TCP…
read more here.
Keywords:
layer;
cuckoo search;
application layer;
app ddos ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3197283
Abstract: Multi-microgrid systems can improve the resiliency and reliability of the power system network. Secure communication for multi-microgrid operation is a crucial issue that needs to be investigated. This paper proposes a multi-controller software defined networking…
read more here.
Keywords:
attack storage;
software defined;
defined networking;
architecture ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3199712
Abstract: The dynamic nature of the vehicular space exposes it to distributed malicious attacks irrespective of the integration of enabling technologies. The software-defined network (SDN) represents one of these enabling technologies, providing an integrated improvement over…
read more here.
Keywords:
sdn;
sdn based;
detection;
grid search ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2017.2766636
Abstract: A Slow HTTP distributed denial of service (DDoS) attack causes a Web server to be unavailable, but it is difficult to detect in a network, because its traffic patterns are similar to those of legitimate…
read more here.
Keywords:
slow http;
http ddos;
ddos attack;
http ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "PLoS ONE"
DOI: 10.1371/journal.pone.0273681
Abstract: Software-defined networks offer a new approach that attracts the attention of most academic and industrial circles due to the features it contains. However, some loopholes make such modern networks vulnerable to many types of attacks.…
read more here.
Keywords:
software defined;
defined networks;
trust;
attack ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "Future Internet"
DOI: 10.3390/fi15020076
Abstract: Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attacks…
read more here.
Keywords:
ddos;
layer;
deep learning;
ddos attacks ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "Journal of Marine Science and Engineering"
DOI: 10.3390/jmse11051000
Abstract: The maritime industry, which transports approximately 90% of the world’s goods, plays a crucial role in the global economy. However, increasing reliance on digital technologies has made the industry vulnerable to cybersecurity threats that may…
read more here.
Keywords:
vulnerability iso;
iso 19847;
ddos attack;
shipboard data ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Mathematics"
DOI: 10.3390/math11092145
Abstract: DDoS attacks remain a persistent cybersecurity threat, blocking services to legitimate users and causing significant damage to reputation, finances, and potential customers. For the detection of DDoS attacks, machine learning techniques such as supervised learning…
read more here.
Keywords:
ddos;
convolutional neural;
detection;
featuring geometrical ... See more keywords