294 Hits in 6.0 sec

An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

Steven Simpson, Syed Noorulhassan Shirazi, Angelos Marnerides, Simon Jouet, Dimitrios Pezaros, David Hutchison
2018 IEEE Transactions on Network and Service Management  
Distributed denial-of-service (DDoS) attacks continue to trouble network operators and service providers, and with increasing intensity.  ...  Furthermore, a network required to take action may be in an autonomous system (AS) several AShops away from the service, so it has no direct relationship with the service on whose behalf it acts.  ...  ACKNOWLEDGMENT The authors wish to thank Nic Hart for input on evaluation.  ... 
doi:10.1109/tnsm.2018.2828938 fatcat:rbodqdiicvfabcexa6vto7fegu

DHT-based security infrastructure for trusted internet and grid computing

Kai Hwang, Min Cai, Yu Kwong Kwok, Shanshan Song, Yu Chen, Ying Chen
2006 International Journal of Critical Infrastructures  
We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications.  ...  intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks.  ...  Acknowledgements We are grateful to GridSec team members, Xiaosong Lou and Runfang Zhou, for useful discussions.  ... 
doi:10.1504/ijcis.2006.011348 fatcat:wdz6gltfbrfh3iws4ze3cel7jq

Expansive networks: Exploiting spectrum sharing for capacity boost and 6G vision

Gurkan Gur
2020 Journal of Communications and Networks  
We then present security implications of expansive networks, an important concern due to more open and coupled systems in expansive networks.  ...  To this end, we elaborate on a key aspect of an expansive network as a concrete example: Spectrum resource at the PHY layer.  ...  to expand towards other networks' spectral resources inherently entails an attack vector for DoS attacks 1 .  ... 
doi:10.23919/jcn.2020.000037 fatcat:3g2ya75vdrdijduseiklrgx7aq

Adversarial genetic programming for cyber security: a rising application domain where GP matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
2020 Genetic Programming and Evolvable Machines  
Its goal is to elucidate the dynamics of cyber networks under attack by computationally modeling and simulating them.  ...  Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters.  ...  AVAIL assumes an enterprise network in carrying out a mission, and that an adversary employs availability attacks against the network to disrupt it.  ... 
doi:10.1007/s10710-020-09389-y fatcat:pptcxqfc6zeptdstzl3ipewrym

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
2020 Zenodo  
Its goal is to elucidate the dynamics of cyber networks under attack by computationally modeling and simulating them.  ...  Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters.  ...  AVAIL assumes an enterprise network in carrying out a mission, and that an adversary employs availability attacks against the network to disrupt it.  ... 
doi:10.5281/zenodo.4593284 fatcat:mpwyc4xbhbhahlaagf44a22abe

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
In [283] , authors proposed a multiple inter-symbol obfuscation scheme, which depends on AN symbols.  ...  Moreover, increment of number of BS will increase the potential vulnerability points in 5G Networks [117] , [118] Core Network DDoS Attacks DDoS attacks can be launched in a form of Signaling Amplification  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Cluster-Based Antiphishing (CAP) Model for Smart Phones

Mohammad Faisal, Sa'ed Abed, Shah Nazir
2021 Scientific Programming  
Until a new mechanism is discovered, the diverse classifications of technology mean that one security contrivance cannot be a remedy for phishing attacks in all circumstances.  ...  In this paper, we developed a cluster-based antiphishing (CAP) model, which is a lightweight scheme specifically for smartphones to save energy in portable devices.  ...  , and transaction based authentication based on digital signatures and hashing Less complexity, no need of inter e- mail domains cooperation, enhance security Vulnerable to man-in-the- middle  ... 
doi:10.1155/2021/9957323 fatcat:36fa5rzhwzg3vnphexycceknk4

Security Data Collection and Data Analytics in the Internet: A Survey

Xuyang Jing, Zheng Yan, Witold Pedrycz
2018 IEEE Communications Surveys and Tutorials  
attacks and to measure its security.  ...  We first divide the data related to network security measurement into four categories: 1) packet-level data; 2) flow-level data; 3) connection-level data; and 4) host-level data.  ...  [72] proposed an efficient method that can be deployed in network backbone to distinguish AL-DDoS flooding attacks from flash crowds.  ... 
doi:10.1109/comst.2018.2863942 fatcat:zmkxyf5tx5bhdoodq53w2kx6wy

Security, Privacy, and Access Control in Information-Centric Networking: A Survey [article]

Reza Tourani, Travis Mick, Satyajayant Misra, Gaurav Panwar
2017 arXiv   pre-print
Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with  ...  In the broad area of security, we review attack scenarios, such as denial of service, cache pollution, and content poisoning.  ...  An attacker can enforce verification of every fake content, by requesting it twice; at scale this could lead to a DoS/DDoS attack.  ... 
arXiv:1603.03409v3 fatcat:ynhnoqve3nbzrdvlxy4jigzlkq

Security Middleground for Resource Protection in Measurement Infrastructure-as-a-Service

Ravi Akella, Saptarshi Debroy, Prasad Calyam, Alex Berryman, Kunpeng Zhu, Mukundan Sridharan
2016 IEEE Transactions on Services Computing  
Securing multi-domain network performance monitoring (NPM) systems that are being widely deployed as 'Measurement Infrastructure-as-a-Service' (MIaaS) in high-performance computing is becoming increasingly  ...  It presents an emerging set of research challenges in cloud security given that security mechanisms such as policy-driven access to federated NPM services across multiple domains need to be designed carefully  ...  The likelihood for DDoS attack succeeding remains the same as the likelihood of initiation because once DDoS attacks are initiated, they are likely to succeed.  ... 
doi:10.1109/tsc.2016.2618792 fatcat:25dcxv3kvzcova5bw3knjfpvba

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
In terms of security, impersonation attacks are plausible, due to the inadequacy of mutual-authentication schemes within inter-slice entities.  ...  Fog computing was introduced by the Cisco systems in 2012, envisioning an infrastructure formed by a collaborative cloud network that facilitates services performed by geographically dispersed edge nodes  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

An SDN and NFV Use Case: NDN Implementation and Security Monitoring [chapter]

Théo Combe, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Bertrand Mathieu, Edgardo Montes de Oca
2017 Computer Communications and Networks  
The natural following of this research work is to assess the whole infrastructure while processing real user traffic while facing attacks in the same time.  ...  Therefore, we plan to involve soon real users thanks to the HTTP-NDN gateway.  ...  In this case, an attacker, located in an IP domain who wants to reproduce an IFA in an intermediate NDN island by leveraging HTTP traffic, may try to flood the network with HTTP requests for nonexisting  ... 
doi:10.1007/978-3-319-64653-4_12 dblp:series/ccn/CombeMCDMO17 fatcat:qmyuxcdiffgjpob44jhtxprc5u

Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research

Majda Wazzan, Daniyal Algazzawi, Omaima Bamasaq, Aiiad Albeshri, Li Cheng
2021 Applied Sciences  
At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices.  ...  To accomplish this goal, a systematic literature review (SLR), an effective method, was applied for gathering and critically reviewing research papers.  ...  The proposed scheme has shown that when forcing attacks the edge first by using fog computing, DDoS attacks can be alleviated by exploiting SDN.  ... 
doi:10.3390/app11125713 fatcat:d56mns6avfhwtk4rqkwxoomoqi

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

Pooja Anand, Yashwant Singh, Arvind Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar
2020 IEEE Access  
However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them.  ...  Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).  ...  Following this in the next phases, malware is downloaded in the device which is spread across the network to launch a DDoS attack.  ... 
doi:10.1109/access.2020.3022842 fatcat:ifkplk2lsjhupkt4c42fovqpta

Modelling cyber security for software-defined networks those grow strong when exposed to threats

Usama Ahmed, Imran Raza, Syed Asad Hussain, Amjad Ali, Muddesar Iqbal, Xinheng Wang
2015 Journal of Reliable Intelligent Environments  
Whether the information is being processed in the application, in transit within the network or residing in the storage, it is equally susceptible to attack at every level of abstraction and cannot be  ...  The nature of SDN, mainly its programmability and centrality of network information and control has led us to think of security in an antifragile per-B Muddesar Iqbal spective.  ...  Machine IP address and network IP address are two other identifiers used in this scheme. This scheme is implemented as a service in OpenFlowbased networks using NOX controller.  ... 
doi:10.1007/s40860-015-0008-0 fatcat:5uzcjwxp4bhnfbq3acw6srtmny
« Previous Showing results 1 — 15 out of 294 results