Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3249474
Abstract: Adversaries perform port scanning to discover accessible and vulnerable hosts as a prelude to cyber havoc. A darknet is a cyberattack observation network to capture these scanning activities through reachable yet unused IP addresses. However,…
read more here.
Keywords:
internet wide;
fingerprint;
coordinated internet;
tcp header ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2019.2954539
Abstract: Recently, Internet-wide scanning has emerged as an important element of detecting the security vulnerabilities of the Internet of Things (IoT) devices. However, Internet-wide scanning induces network congestion when sending a huge number of port scanning…
read more here.
Keywords:
internet wide;
congestion;
iot devices;
rate ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3132389
Abstract: The Internet of Things (IoT) has created acute network security concerns owing to their weak protocols and limited system resources. Vulnerable IoT devices increase the risk of compromising other devices connected to the network. Hence,…
read more here.
Keywords:
wide port;
internet wide;
wlan;
security ... See more keywords