538 Hits in 4.0 sec

Collective Responsibility and Mutual Coercion in IoT Botnets - A Tragedy of the Commons Problem

Carolina Adaros Boye, Paul Kearney, Mark Josephs
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
the attack their incentive is little.  ...  Four areas of solution are proposed based on the review of this problem in different contexts. It was found necessary to include non-technical solutions and consider human behaviour.  ...  In the past years a new modality of botnet has become frequent which uses insecure IoT devices to perform Distributed Denial of Service (DDoS) attacks to a third party.  ... 
doi:10.5220/0006944706360646 dblp:conf/icete/BoyeKJ18 fatcat:qvzbrd3vqzbgtohxoulgmov4yi

Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight

Sharyar Wani, Mohammed Imthiyas, Hamad Almohamedh, Khalid M Alhamed, Sultan Almotairi, Yonis Gulzar
2021 Symmetry  
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate requests on any network.  ...  A number of mitigation schemes have been designed and developed since its inception but the increasing complexity demands advanced solutions based on emerging technologies.  ...  We would also like to thank International Islamic University Malaysia and the Deanship of Scientific Research at Majmaah University for their support towards the completion of this work.  ... 
doi:10.3390/sym13020227 fatcat:tftfhqczzrasjnxoxpputrh4ey

Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks

Bruno Rodrigues, Eder Scheid, Christian Killer, Muriel Franco, Burkhard Stiller
2020 Journal of Network and Systems Management  
Distributed Denial-of-Service (DDoS) attacks are one of the major causes of concerns for communication service providers.  ...  Future network and service management can base its operations on equally distributed systems to neutralize highly distributed DDoS attacks.  ...  Acknowledgements This paper was supported partially by (a) the University of Zürich UZH, Switzer-  ... 
doi:10.1007/s10922-020-09559-4 fatcat:utcjchazqrgqli3n23tva7fanq

Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model

Adedayo Aderibole, Aamna Aljarwan, Muhammad Habib Ur Rehman, Hatem. H. Zeineldin, Toufic Mezher, Khaled Salah, Ernesto Damiani, Davor Svetinovic
2020 IEEE Access  
Blockchain technology is showing a significant potential to disrupt a number of information technology domains. One of the especially interesting areas for blockchain applications is smart grid.  ...  INDEX TERMS Smart grid, blockchain, decentralization, trust, incentive.  ...  It also enables to safeguard against denial of service attacks due to multiple communication points in the network.  ... 
doi:10.1109/access.2020.2977149 fatcat:4lv7jp22znaqxdli3vqbhklfdy

When Mobile Blockchain Meets Edge Computing [article]

Zehui Xiong, Yang Zhang, Dusit Niyato, Ping Wang, Zhu Han
2018 arXiv   pre-print
We first introduce a novel concept of edge computing for mobile blockchain. Then, we introduce an economic approach for edge computing resource management.  ...  To facilitate blockchain applications in future mobile Internet of Things systems, multiple access mobile edge computing appears to be an auspicious solution to solve the proof-of-work puzzles for mobile  ...  Distributed Denial of Service (DDoS) attacks can be easily launched to disrupt the connection and operation of mobile blockchain.  ... 
arXiv:1711.05938v2 fatcat:surino2rw5atdplwx5f4lyyrmq

A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid

A. Huseinovic, S. Mrdovic, K. Bicakci, S. Uludag
2020 IEEE Access  
Denial of Service DMS Distribution Management System DoS Attack Denial of Service Attack EDP Economic Dispatch Problem ESS Energy Storage System EV Electric Vehicle FACTS Flexible Alternating  ...  INTERNET DOS ATTACKS Denial of Service (DoS) are the type of attacks in which the attacker or a group of attackers attempt to make a service or computing/networking resource unavailable for its intended  ... 
doi:10.1109/access.2020.3026923 fatcat:cpdqhwe2era6hmewqvmmja7dny

Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access [article]

Chenglong Fu, Qiang Zeng, Xiaojiang Du
2019 arXiv   pre-print
In this paper, we take a retrospection of existing blockchain-based IoT solutions and propose a framework for efficient blockchain and IoT integration.  ...  By introducing incentives and penalties enforced by smart contracts, our work enables "an economic approach" to thwarting the majority of attackers who aim to achieve monetary gains.  ...  As a result, third-party relay servers get the incentive to shield their customer IoT devices, which gives vulnerable IoT devices additional protection against zero-day attacks. b) Contribution: We rethink  ... 
arXiv:1912.00264v1 fatcat:hclxktx5bbhgrmyb5sii22ytze

Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

Michele De Donno, Alberto Giaretta, Nicola Dragoni, Antonio Bucchiarone, Manuel Mazzara
2019 Future Internet  
However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage.  ...  Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every  ...  Network Level Issues DoS attacks, as well as Distributed Denial of Service (DDoS) attacks, are the main categories of attacks that can affect availability at the network level.  ... 
doi:10.3390/fi11060127 fatcat:zlvlmx4elzfm7poy33e2kplcdu

Proactive Defense Against Physical Denial of Service Attacks using Poisson Signaling Games [article]

Jeffrey Pawlick, Quanyan Zhu
2017 arXiv   pre-print
In particular, distributed denial-of-service (DDoS) attacks overload the bandwidth of a server. But many IoT devices form part of cyber-physical systems (CPS).  ...  In this paper, we quantify the population-based risk to a group of IoT devices targeted by malware for a PDoS attack.  ...  We describe an IoT attack called a denial of cyber-physical service (PDoS). 2.  ... 
arXiv:1707.03708v2 fatcat:kkzrsldbobctnkwwzgohunzbim

Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations

Mohammad Kamrul Hasan, Ali Alkhalifah, Shayla Islam, Nissrein B. M. Babiker, A. K. M. Ahasan Habib, Azana Hafizah Mohd Aman, Md. Arif Hossain
2022 Wireless Communications and Mobile Computing  
Throughout this way, big data and the Internet always provide a revolutionary solution for ensuring that electrical energy linked intelligent grid, also known as the energy Internet.  ...  Then, we identify a variety of recent blockchain-based research works published in various literature and discuss security concerns on smart grid systems.  ...  to defend against denial of service).  ... 
doi:10.1155/2022/9065768 doaj:3b0952d85b8749ce9a24458a6d20f614 fatcat:2oteo3fv6zfqrleljyntocebru

Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network

Saurabh Singh, A.S.M. Sanwar Hosen, Byungun Yoon
2021 IEEE Access  
Blockchain technology can also be applied to the Internet of Things (IoT). The advancement of IoT technology in various domains has led to substantial progress in distributed systems.  ...  This paper discusses the blockchain concept and relevant factors that provide a detailed analysis of potential security attacks and presents existing solutions that can be deployed as countermeasures to  ...  Blockchain technology is at the center of many current developments in the IoT industry. One reason for this is that many IoT services are vulnerable to attacks and challenges.  ... 
doi:10.1109/access.2021.3051602 fatcat:2psy7mq6zrhhnjzg35d6aaecsq

A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues [article]

Khizar Hameed, Mutaz Barika, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang
2021 arXiv   pre-print
This study presents a state-of-the-art survey of Blockchain-based Industry 4.0 applications, focusing on crucial application and security and privacy requirements, as well as corresponding attacks on Blockchain  ...  Although several approaches have been proposed to address the specific security and privacy needs of targeted applications with functional parameters, there is still a need for a research study on the  ...  The network layer is subject to the following attacks such as 51% attack, denial-of-service attack, distributed denial-of-service attack, eclipse attack, Sybil attack, BGP Hijacking attack, phishing attack  ... 
arXiv:2105.11665v1 fatcat:bsm7w2shjneajp425oddszr6ju

Internet of things security: A top-down survey

Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef
2018 Computer Networks  
Finally, we give a general classification of existing solutions and comparison based on important parameters.  ...  In this paper, we provide a comprehensive top down survey of the most recent proposed security and privacy solutions in IoT.  ...  Attacks could come from any of those entities or from a set of entities conducting a Distributed Denial of Service (DDoS) attacks.  ... 
doi:10.1016/j.comnet.2018.03.012 fatcat:xbczp44t6neqxcfy74q6rsvuci

Pay the Piper: DDoS mitigation technique to deter financially-motivated attackers

2019 IEICE transactions on communications  
Distributed Denial of Service attacks against the application layer (L7 DDoS) are among the most difficult attacks to defend against because they mimic normal user behavior.  ...  On the basis of this model, we evaluate attacker strategies in a game theory manner and demonstrate that the proposed solution provides only negative economic benefits to attackers.  ...  Acknowledgments A part of this work was funded by the WarpDrive: Webbased Attack Response with Practical and Deployable Research Initiative project, supported by the National Institute of Information and  ... 
doi:10.1587/transcom.2019nrp0001 fatcat:ji534l2wnrfwvliqomf6n77zgu

A Survey of Network and Information Security

Huang Jie
2019 International Journal of Informatics and Computation  
Apparently, the first step to detect network attacks and intrusions is to collect the security-related data.  ...  Internet of Things. In this paper, we describe many methods in Information Security. Is consist of Information Security in Big Data and Cloud Computing.  ...  Vicente Segura conducted a study on economic incentives of DDoS attack.  ... 
doi:10.35842/ijicom.v1i2.6 fatcat:qv5wz72eorbkzoae2lhlnumrmy
« Previous Showing results 1 — 15 out of 538 results