A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks
2018
IEEE Transactions on Network and Service Management
Distributed denial-of-service (DDoS) attacks continue to trouble network operators and service providers, and with increasing intensity. ...
Furthermore, a network required to take action may be in an autonomous system (AS) several AShops away from the service, so it has no direct relationship with the service on whose behalf it acts. ...
ACKNOWLEDGMENT The authors wish to thank Nic Hart for input on evaluation. ...
doi:10.1109/tnsm.2018.2828938
fatcat:rbodqdiicvfabcexa6vto7fegu
DHT-based security infrastructure for trusted internet and grid computing
2006
International Journal of Critical Infrastructures
We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. ...
intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. ...
Acknowledgements We are grateful to GridSec team members, Xiaosong Lou and Runfang Zhou, for useful discussions. ...
doi:10.1504/ijcis.2006.011348
fatcat:wdz6gltfbrfh3iws4ze3cel7jq
Expansive networks: Exploiting spectrum sharing for capacity boost and 6G vision
2020
Journal of Communications and Networks
We then present security implications of expansive networks, an important concern due to more open and coupled systems in expansive networks. ...
To this end, we elaborate on a key aspect of an expansive network as a concrete example: Spectrum resource at the PHY layer. ...
to expand towards other networks' spectral resources inherently entails an attack vector for DoS attacks 1 . ...
doi:10.23919/jcn.2020.000037
fatcat:3g2ya75vdrdijduseiklrgx7aq
Adversarial genetic programming for cyber security: a rising application domain where GP matters
2020
Genetic Programming and Evolvable Machines
Its goal is to elucidate the dynamics of cyber networks under attack by computationally modeling and simulating them. ...
Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters. ...
AVAIL assumes an enterprise network in carrying out a mission, and that an adversary employs availability attacks against the network to disrupt it. ...
doi:10.1007/s10710-020-09389-y
fatcat:pptcxqfc6zeptdstzl3ipewrym
Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
2020
Zenodo
Its goal is to elucidate the dynamics of cyber networks under attack by computationally modeling and simulating them. ...
Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters. ...
AVAIL assumes an enterprise network in carrying out a mission, and that an adversary employs availability attacks against the network to disrupt it. ...
doi:10.5281/zenodo.4593284
fatcat:mpwyc4xbhbhahlaagf44a22abe
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions
2019
IEEE Communications Surveys and Tutorials
In [283] , authors proposed a multiple inter-symbol obfuscation scheme, which depends on AN symbols. ...
Moreover, increment of number of BS will increase the potential vulnerability points in 5G Networks [117] , [118] Core Network DDoS Attacks DDoS attacks can be launched in a form of Signaling Amplification ...
doi:10.1109/comst.2019.2933899
fatcat:bulfng6levdelgmel7oxoi6pna
Cluster-Based Antiphishing (CAP) Model for Smart Phones
2021
Scientific Programming
Until a new mechanism is discovered, the diverse classifications of technology mean that one security contrivance cannot be a remedy for phishing attacks in all circumstances. ...
In this paper, we developed a cluster-based antiphishing (CAP) model, which is a lightweight scheme specifically for smartphones to save energy in portable devices. ...
,
and transaction based
authentication based
on digital signatures
and hashing
Less complexity,
no need of inter e-
mail domains
cooperation,
enhance security
Vulnerable to
man-in-the-
middle ...
doi:10.1155/2021/9957323
fatcat:36fa5rzhwzg3vnphexycceknk4
Security Data Collection and Data Analytics in the Internet: A Survey
2018
IEEE Communications Surveys and Tutorials
attacks and to measure its security. ...
We first divide the data related to network security measurement into four categories: 1) packet-level data; 2) flow-level data; 3) connection-level data; and 4) host-level data. ...
[72] proposed an efficient method that can be deployed in network backbone to distinguish AL-DDoS flooding attacks from flash crowds. ...
doi:10.1109/comst.2018.2863942
fatcat:zmkxyf5tx5bhdoodq53w2kx6wy
Security, Privacy, and Access Control in Information-Centric Networking: A Survey
[article]
2017
arXiv
pre-print
Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with ...
In the broad area of security, we review attack scenarios, such as denial of service, cache pollution, and content poisoning. ...
An attacker can enforce verification of every fake content, by requesting it twice; at scale this could lead to a DoS/DDoS attack. ...
arXiv:1603.03409v3
fatcat:ynhnoqve3nbzrdvlxy4jigzlkq
Security Middleground for Resource Protection in Measurement Infrastructure-as-a-Service
2016
IEEE Transactions on Services Computing
Securing multi-domain network performance monitoring (NPM) systems that are being widely deployed as 'Measurement Infrastructure-as-a-Service' (MIaaS) in high-performance computing is becoming increasingly ...
It presents an emerging set of research challenges in cloud security given that security mechanisms such as policy-driven access to federated NPM services across multiple domains need to be designed carefully ...
The likelihood for DDoS attack succeeding remains the same as the likelihood of initiation because once DDoS attacks are initiated, they are likely to succeed. ...
doi:10.1109/tsc.2016.2618792
fatcat:25dcxv3kvzcova5bw3knjfpvba
Survey on Multi-Access Edge Computing Security and Privacy
2021
IEEE Communications Surveys and Tutorials
In terms of security, impersonation attacks are plausible, due to the inadequacy of mutual-authentication schemes within inter-slice entities. ...
Fog computing was introduced by the Cisco systems in 2012, envisioning an infrastructure formed by a collaborative cloud network that facilitates services performed by geographically dispersed edge nodes ...
doi:10.1109/comst.2021.3062546
fatcat:u3xxvixiw5a4fdl2wxdla24ocu
An SDN and NFV Use Case: NDN Implementation and Security Monitoring
[chapter]
2017
Computer Communications and Networks
The natural following of this research work is to assess the whole infrastructure while processing real user traffic while facing attacks in the same time. ...
Therefore, we plan to involve soon real users thanks to the HTTP-NDN gateway. ...
In this case, an attacker, located in an IP domain who wants to reproduce an IFA in an intermediate NDN island by leveraging HTTP traffic, may try to flood the network with HTTP requests for nonexisting ...
doi:10.1007/978-3-319-64653-4_12
dblp:series/ccn/CombeMCDMO17
fatcat:qmyuxcdiffgjpob44jhtxprc5u
Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research
2021
Applied Sciences
At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices. ...
To accomplish this goal, a systematic literature review (SLR), an effective method, was applied for gathering and critically reviewing research papers. ...
The proposed scheme has shown that when forcing attacks the edge first by using fog computing, DDoS attacks can be alleviated by exploiting SDN. ...
doi:10.3390/app11125713
fatcat:d56mns6avfhwtk4rqkwxoomoqi
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges
2020
IEEE Access
However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them. ...
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT). ...
Following this in the next phases, malware is downloaded in the device which is spread across the network to launch a DDoS attack. ...
doi:10.1109/access.2020.3022842
fatcat:ifkplk2lsjhupkt4c42fovqpta
Modelling cyber security for software-defined networks those grow strong when exposed to threats
2015
Journal of Reliable Intelligent Environments
Whether the information is being processed in the application, in transit within the network or residing in the storage, it is equally susceptible to attack at every level of abstraction and cannot be ...
The nature of SDN, mainly its programmability and centrality of network information and control has led us to think of security in an antifragile per-B Muddesar Iqbal spective. ...
Machine IP address and network IP address are two other identifiers used in this scheme. This scheme is implemented as a service in OpenFlowbased networks using NOX controller. ...
doi:10.1007/s40860-015-0008-0
fatcat:5uzcjwxp4bhnfbq3acw6srtmny
« Previous
Showing results 1 — 15 out of 294 results