187 Hits in 6.7 sec

Poisoning Online Learning Filters: DDoS Attacks and Countermeasures [article]

Wesley Joon-Wie Tann, Ee-Chien Chang
2022 arXiv   pre-print
In this paper, we conduct the first systematic study on the effects of data poisoning attacks on online DDoS filtering; introduce one such attack method, and propose practical protective countermeasures  ...  Comprehensive experiments show that online learning filters are highly susceptible to poisoning attacks, sometimes performing much worse than a random filtering strategy in this attack scenario.  ...  POISONING DDoS FILTERS In this section, we formulate the problem of poisoning DDoS filters and discuss the challenges of avoiding online learning detection models that constantly update themselves.  ... 
arXiv:2107.12612v2 fatcat:yutkbircdngylajkjerbblltne

Effective and Reliable Countermeasures for Detecting DDOS Attack in IDS

Mohammad Abrahim Wani, Rshma Chawla
2015 International Journal of Engineering Research and  
of service and distributed denial of service attacks.  ...  In order to fix this gap a frame work is designed that handles all aspects of DoS/DDoS attacks in IDS.  ...  solutions Lee in 2004 described the DDOS attack and proposes taxonomies to illustrate the scale of DDOS attack, the characteristics of software attack tools used and the countermeasures available, but  ... 
doi:10.17577/ijertv4is030923 fatcat:lze5v3masrhexkjnpoywt6a3r4

Machine Learning for E-mail Spam Filtering: Review,Techniques and Trends [article]

Alexy Bhowmick, Shyamanta M. Hazarika
2016 arXiv   pre-print
We conclude by measuring the impact of Machine Learning-based filters and explore the promising offshoots of latest developments.  ...  We focus primarily on Machine Learning-based spam filters and their variants, and report on a broad review ranging from surveying the relevant ideas, efforts, effectiveness, and the current progress.  ...  Bayesian poisoning is such a kind of statistical attack in which spammers use carefully crafted e-mails to attack the heart of a Bayesian filter and thus degrade its effectiveness.  ... 
arXiv:1606.01042v1 fatcat:cblnuc4knfhehjwzjeeekbgf3m

A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

Hichem Mrabet, Sana Belguith, Adeeb Alhomoud, Abderrazak Jemai
2020 Sensors  
Likewise, we propose a new classification of security threats and attacks based on new IoT architecture.  ...  The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning  ...  Ingress/Egress filtering, D-WARD, Hop Count Filtering, and SYN-Cookies are DDoS attack countermeasures [23] .  ... 
doi:10.3390/s20133625 pmid:32605178 pmcid:PMC7374330 fatcat:rk52vsqrrzd2hebt2xddhrdt54

SoK: Applying Machine Learning in Security - A Survey [article]

Heju Jiang, Jasvir Nagra, Parvez Ahammad
2016 arXiv   pre-print
The idea of applying machine learning(ML) to solve problems in security domains is almost 3 decades old.  ...  Based on our survey, we also suggest a point of view that treats security as a game theory problem instead of a batch-trained ML problem.  ...  We survey cutting-edge research on applied ML in security, and provide a high-level overview taxonomy of ML paradigms and security domains. 2.  ... 
arXiv:1611.03186v1 fatcat:hfvc5hhu7ze77lrnjufslcg6gm

A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment

N.Ch. Sriman Narayana Iyengar, Gopinath Ganapathy, P.C. Mogan Kumar, Ajith Abraham
2014 International Journal of Grid and Utility Computing  
In this paper, we propose 'Multilevel Thrust Filtration (MTF) mechanism' as a solution, which authenticates the incoming requesters and detects the different types of DDoS attacks at different levels to  ...  Distributed Denial of Service (DDoS) is a kind of resource-availabilityrelated attack launched with the aim of subverting the Data Centre (DC) for resource unavailability to the legitimate clients.  ...  Some of them are man in the middle attack, ping of death attack, ARP poisoning, smurf attack and Distributed Denial of Service (DDoS).  ... 
doi:10.1504/ijguc.2014.065384 fatcat:zztqkeino5glpalnsxvprvdgs4

A Survey on Security Attacks with Remote Ground Robots

2021 El-Cezeri: Journal of Science and Engineering  
One of the main contributions of the paper is to present cyber-attacks on wearable e-health devices with ground robots.  ...  The paper contains the architecture of wearable health devices to show the potential attack surface.  ...  The first countermeasure should be preventing DDoS attacks through various IP filtering techniques.  ... 
doi:10.31202/ecjse.916532 fatcat:zh6avv42cfgjjlipycjtm4x2gu

Distributed Denial-of-Service (DDoS) Attacks and Defence Mechanisms in Various Web-enabled Computing Platforms

2022 International Journal on Semantic Web and Information Systems (IJSWIS)  
In the end, we list prevalent DDoS attack tools and open challenges.  ...  One of the simple yet powerful attack, lurking around the Internet today, is the Distributed Denial-of-Service (DDoS) attack.  ...  Ingress/Egress packet filtering (Aamir & Zaidi, 2014; Peng et al., 2007; Zargar et al., 2013 ) is one of the early countermeasures against DDoS attacks, deployed at the edge routers of the networks.  ... 
doi:10.4018/ijswis.297143 fatcat:imoau72665dxbmfdoxvntbyyiq

Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)

Parya Haji Mirzaee, Mohammad Shojafar, Haitham Cruickshank, Rahim Tafazolli
2022 IEEE Access  
In addition, recently, there has been an ever-increasing use of machine intelligence and Machine Learning (ML) algorithms in different components of SG.  ...  However, the development of wireless communications, the increased level of autonomy, and the growing sofwarisation and virtualisation trends have expanded the attack susceptibility and threat surface  ...  The authors also propose an online reinforcement learning detection instead of conventional strategies based on supervised and offline learning.  ... 
doi:10.1109/access.2022.3174259 fatcat:txuebjhpnre73cq5lbx77ugmhq

Domain Name System Security and Privacy: A Contemporary Survey [article]

Aminollah Khormali, Jeman Park, Hisham Alasmary, Afsah Anwar, David Mohaisen
2020 arXiv   pre-print
countermeasures.  ...  The domain name system (DNS) is one of the most important components of today's Internet, and is the standard naming convention between human-readable domain names and machine-routable IP addresses of  ...  [20] have proposed a DNS cache poisoning attack detection system based on the Kalman filter technique.  ... 
arXiv:2006.15277v1 fatcat:loknouehirdhvdgztkevi27vse

Security, Privacy, and Access Control in Information-Centric Networking: A Survey [article]

Reza Tourani, Travis Mick, Satyajayant Misra, Gaurav Panwar
2017 arXiv   pre-print
In the broad area of security, we review attack scenarios, such as denial of service, cache pollution, and content poisoning.  ...  We conclude the survey with lessons learned and scope for future work.  ...  In the security section, we address denial of service (DoS and distributed DoS or DDoS) attacks and vulnerabilities unique to ICN, including cache pollution, content poisoning, and naming attacks.  ... 
arXiv:1603.03409v3 fatcat:ynhnoqve3nbzrdvlxy4jigzlkq

Methods and Techniques for Dynamic Deployability of Software-Defined Security Services [article]

Roberto Doriguzzi-Corin
2020 arXiv   pre-print
Denial of Service (DDoS) attacks.  ...  , and (ii) novel methods based on Deep Learning and Linux kernel technologies for reducing the CPU usage of software-based security network functions, with specific focus on the defence against Distributed  ...  ) to learn the behaviour of DDoS and benign traffic flows with both low processing overhead and attack detection time.  ... 
arXiv:2004.02876v1 fatcat:apaxjkq3qzb6ragrpt3izpucpa

AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler? [article]

C. Benzaid, T. Taleb
2022 arXiv   pre-print
patterns from a large set of time-varying multi-dimensional data, and deliver faster and accurate decisions.  ...  This paper sheds light on how AI may impact the security of 5G and its successive from its posture of defender, offender or victim, and recommends potential defenses to safeguard from malevolent AI while  ...  The module leverages an online ML service to detect suspicious activities in the RAN, such as the symptoms of a signaling DDoS attack.  ... 
arXiv:2201.02730v1 fatcat:upuk2pjcfzag5bjs5woeiwkxe4

A Comprehensive Study on Intrusion and Extrusion Phenomena

Md. Abdul Hamid, Marjia Akter, M. F. Mridha, Muhammad Mostafa Monowar, Madini O. Alassafi
2021 International Journal of Advanced Computer Science and Applications  
Intrusion and extrusion events, breach of security system, hamper the protection of the devices or systems.  ...  The worst case can be N-packets of ACK-storm DoS attack may consume the overall bandwidth of a network.  ...  We strongly believe that there is a need for a smart system that might learn and take effective countermeasures against the impending threats.  ... 
doi:10.14569/ijacsa.2021.0120899 fatcat:5kanmwdbhzfx7lldjmaqd3glgi

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu
2021 IEEE Access  
Backdoor attack, 6) Ransomware attack, 7) Distributed Denial of Service (DDoS) attack, 8) Denial of Service (DoS) attack, and 9) Scanning attack.  ...  [135] categorized poisoning attacks using the sources of poisoned model updates into two types, namely, model poisoning and data poisoning.  ...  ., and Habilitation degrees in computer science from Badji Mokhtar-Annaba University, Annaba, Algeria, in June, 2008, June, 2010, June, 2014, and April, 2019, respectively.  ... 
doi:10.1109/access.2021.3118642 fatcat:222fgsvt3nh6zcgm5qt4kxe7c4
« Previous Showing results 1 — 15 out of 187 results