1,152 Hits in 7.9 sec

Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid [article]

Jianhua Li, Ximeng Liu, Jiong Jin, Shui Yu
2021 arXiv   pre-print
Under this circumstance, we revisit the DDoS attack and defense in terms of attacking cost and populations of both parties, proposing a joint defense framework to incur higher attacking expense in a grid  ...  The distributed denial of service (DDoS) attack is detrimental to businesses and individuals as we are heavily relying on the Internet.  ...  Our contribution is fourfold: • We investigate the attacking expenses of DDoS attacks and found botnet expense is the primary factor to enlarge the cost of attacking. • We advocate joint-mitigation for  ... 
arXiv:2104.00236v1 fatcat:jcngyfdrvnfs7lq4i4bdvrujnq

Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance

Scott J. Shackelford
2012 Social Science Research Network  
This Article searches for alternative avenues to foster cyber peace by applying a novel governance framework termed polycentric analysis championed by scholars such as Nobel Laureate Elinor Ostrom that  ...  Congress and around the world the time is ripe for a fresh look at this critical topic.  ...  bandwidth, which have been called a form of "information pollution," 82 and distributed denial of service (DDoS) attacks, which can cause targeted websites to crash through too many requests. 83  ... 
doi:10.2139/ssrn.2132526 fatcat:nriwnknjajahvpu64gqnef5ca4

Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey

Weidong Fang, Wuxiong Zhang, Wei Chen, Tao Pan, Yepeng Ni, Yinxuan Yang
2020 Wireless Communications and Mobile Computing  
As a key component of the information sensing and aggregating for big data, cloud computing, and Internet of Things (IoT), the information security in wireless sensor network (WSN) is critical.  ...  Hence, it is necessary to investigate and review the attack and defense with trust management. In this paper, the state-of-the-art trust management schemes are deeply investigated for WSN.  ...  Introduction Currently, the standardization works for Narrowband Internet of Things (NB-IoT) have been completed; the wireless sensor network (WSN) is taken as an important component for sensing and aggregating  ... 
doi:10.1155/2020/2643546 fatcat:l4zu6xoo7bc5bptvbjsqagowze

Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

Linyuan Zhang, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, Jinlong Wang
2015 IEEE Communications Surveys and Tutorials  
In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs.  ...  Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack  ...  helped us improved the quality of this paper significantly.  ... 
doi:10.1109/comst.2015.2422735 fatcat:dc3yq7dparbapht5nswwhhmzr4

FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT [article]

J. Li, L. Lyu, X. Liu, X. Zhang, X. Lyu
2021 arXiv   pre-print
The distributed denial of service (DDoS) attack is detrimental to the industrial Internet of things (IIoT) as it triggers severe resource starvation on networked objects.  ...  Thus, we propose the federated learning empowered mitigation architecture (FLEAM) to advocate joint defense, incurring a higher hacking expense.  ...  Then, attackers demand payments for the "protection" of the victim. Due to the volume of attacks, a single defender finds it hard to defeat such joint attacks coordinated by the attacker.  ... 
arXiv:2012.06150v2 fatcat:jzfv2jxglje7bcsddqep6tem5m

A Survey on Machine Learning against Hardware Trojan Attacks: Recent Advances and Challenges

Zhao Huang, Quan Wang, Yin Chen, Xiaohong Jiang
2020 IEEE Access  
The remarkable success of machine learning (ML) in a variety of research domains has inspired academic and industrial communities to explore its potential to address hardware Trojan (HT) attacks.  ...  Therefore, we divide the HT threats into four layers and propose a hardware Trojan defense (HTD) reference model from the perspective of the overall hardware ecosystem, therein categorizing the security  ...  ACKNOWLEDGMENT The authors would like to thank Dr. J. Zhu, D. Lin, P. Yang, X. Li, Y. Dang, and so on for their suggestions during the revision of the article.  ... 
doi:10.1109/access.2020.2965016 fatcat:dqh376eosnefbl4pyk6ad4sxjq

Machine Learning for Security and the Internet of Things: the Good, the Bad, and the Ugly

Fan Liang, William G. Hatcher, Weixian Liao, Weichao Gao, Wei Yu
2019 IEEE Access  
INDEX TERMS Security, machine learning, cyber physical systems, Internet of Things, applications, distributed environments.  ...  The advancement of the Internet of Things (IoT) has allowed for unprecedented data collection, automation, and remote sensing and actuation, transforming autonomous systems and bringing smart command and  ...  The Internet of Things (IoT) is clearly the next evolution and extension of the Internet, massively integrating IoT devices (sensors, cameras, smartphones, etc.) to communicate across network infrastructures  ... 
doi:10.1109/access.2019.2948912 fatcat:wxd6imn62fgufdmfh3gtaijeru

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
The first paper, "Extensive Design for Attack's Recognition and Resistance of Survivable Network" by Hui Xu and Xiang Gu, gives a solution of attack defense of survivable network based on extentics.  ...  Although the Internet has reached great success in contributing to communications between people, it has been under almost constant attack by hackers.  ...  The Internet of Things The Internet of Things is a new idea in the IT world which refers to the networked interconnection of everyday objects.  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

Cyber-physical Systems (CPS) Security: State of the Art and Research Opportunities for Information Systems Academics

Chetan Kumar, California State University San Marcos, Sean Marston, Ravi Sen, Western Kentucky University, Texas A&M University
2020 Communications of the Association for Information Systems  
In this paper, we stock of the current state of CPS security and identify research opportunities for information systems (IS) academics.  ...  Attacks on cyber-physical systems (CPS) continue to grow in frequency.  ...  region and caused more than 200,000 consumers to lose power (E-ISAC, 2016; Greenberg, 2017) .  Distributed denial-of-service (DDoS) attack launched via Internet of Things (IoT) devices (Sanger & Perlroth  ... 
doi:10.17705/1cais.04731 fatcat:pyn7uyvwvrhglbktfvlsqc3zeu

Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions

Theresa Sobb, Benjamin Turnbull, Nour Moustafa
2020 Electronics  
The technologies that underpin supply chain 4.0 include blockchain, smart contracts, applications of Artificial Intelligence, cyber-physical systems, Internet of Things and Industrial Internet of Things  ...  This is examined from a holistic standpoint and through technology-specific lenses to determine current states and implications for future research directions.  ...  The Commonwealth of Australia will not be legally responsible in contract, tort or otherwise for any statement made in this publication.  ... 
doi:10.3390/electronics9111864 fatcat:h54irum3krb77gsj4x76w2mabm

Microgrid Cyber-Security: Review and Challenges toward Resilience

Bushra Canaan, Bruno Colicchio, Djaffar Ould Abdeslam
2020 Applied Sciences  
Especially with a current academic unanimity on the incremental significance of the microgrid's role in building the future smart grid, this article addresses the existing approaches attending to cyber-physical  ...  First, we start with a brief descriptive review of the most commonly used terms in the latest relevant literature, followed by a comprehensive presentation of the recent efforts explored in a manner that  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app10165649 fatcat:xfxosnpqnnfnpkhgmd6vyrfgfq

Simulation for cybersecurity: state of the art and future directions

Hamdi Kavak, Jose J Padilla, Daniele Vernon-Bido, Saikou Y Diallo, Ross Gore, Sachin Shetty
2021 Journal of Cybersecurity  
In this article, we provide an introduction to simulation for cybersecurity and focus on three themes: (1) an overview of the cybersecurity domain; (2) a summary of notable simulation research efforts  ...  The overview of cybersecurity provides readers with a foundational perspective of cybersecurity in the light of targets, threats, and preventive measures.  ...  Acknowledgments The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1093/cybsec/tyab005 fatcat:nx72szjmi5bxzdiixmvxa6e6ey

Securing Cyberspace: Towards an Agenda for Research and Practice

Renaud Levesque, D'Arcy Walsh, David Whyte
2015 Technology Innovation Management Review  
With the advent of the Internet of Things (IoT), we now live in a digital era that has rapidly transitioned society from a state best described by the term "always connected" to a new reality of "everything  ...  Here, the asymmetric nature of cybersecurity comes into focus, namely the work factor for an attacker is the "cost" of finding a new attack vector while the defender bears a cumulative cost of all known  ...  With the advent of the Internet of Things (IoT), we now live in a digital era that has rapidly transitioned society from a state best described by the term "always connected" to a new reality of "everything  ... 
doi:10.22215/timreview/943 fatcat:4cvi7uxpbvdc5ifobcpnq26anu

Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

Amanda N. Craig, Scott J. Shackelford, Janine S. Hiller
2015 American Business Law Journal  
To provide a framework for our discussion, we begin by describing the historical development of the industry and how it has been shaped by the applicable law in the United States and other G8 nations.  ...  Finally, we assess the emergence of proactive cybersecurity norms, both within industry and international law, and consider the implications of this movement on contemporary Internet governance debates  ...  must double pay-for both the defensive technologies and for the costs of a successful attack.  ... 
doi:10.1111/ablj.12055 fatcat:5b4p2q5otraflb6jjyxuvfdqju

Front Matter: Volume 9842

2016 Signal Processing, Sensor/Information Fusion, and Target Recognition XXV  
A unique citation identifier (CID) number is assigned to each article at the time of publication.  ...  Publication of record for individual papers is online in the SPIE Digital Library. Paper Numbering: Proceedings of SPIE follow an e-First publication model.  ...  in the Internet of Things for Cyber-Physical Systems ze H11 4 a r -, a +kkbkbk; ro ¿ zo ,.a fti4.  ... 
doi:10.1117/12.2246519 fatcat:o7i6ebo6o5hftlqmo7rqhrjony
« Previous Showing results 1 — 15 out of 1,152 results