An intelligent federated learning boosted cyberattack detection system for Denial-Of-Wallet attack using advanced heuristic search with multimodal approaches [PDF]
In the modern digital era, owing to technological progressions, the diversification and intensity of cyber-attacks have attained an extraordinary level.
Elvir Akhmetshin +6 more
doaj +5 more sources
Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment [PDF]
Denial of Wallet (DoW) attacks are a cyber threat designed to utilize and deplete an organization’s financial resources by generating excessive prices or charges in their cloud computing (CC) and serverless computing platforms.
Sarah A. Alzakari +7 more
doaj +5 more sources
Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications [PDF]
Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments.
Amal K. Alkhalifa +7 more
doaj +4 more sources
A Denial of Wallet (DoW) attack is a cyberattack designed to drain financial resources by causing excessive charges or costs on a serverless computing or cloud platform.
P. Renukadevi +4 more
doaj +3 more sources
Denial of wallet—Defining a looming threat to serverless computing [PDF]
Serverless computing is the latest paradigm in cloud computing, offering a framework for the development of event driven, pay-as-you-go functions in a highly scalable environment. While these traits offer a powerful new development paradigm, they have also given rise to a new form of cyber-attack known as Denial of Wallet (forced financial exhaustion).
Daniel Kelly +2 more
openaire +3 more sources
DoWTS – Denial-of-Wallet Test Simulator: Synthetic data generation for preemptive defence
AbstractThe intentional targeting of components in a cloud based application, in order to artificially inflate usage bills, is an issue application owners have faced for many years. This has occurred under many guises, such as: Economic Denial of Sustainability (EDoS), Click Fraud and even secondary effects of Denial of Service (DoS) attacks.
Daniel Kelly +2 more
openaire +2 more sources
Security Attacks on E-Voting System Using Blockchain
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each ...
Saba Abdulbaqi Salman +2 more
doaj +2 more sources
Cybersecurity Test Bed for Smart Contracts
Blockchain, smart contracts, and related concepts have emerged in recent years as a promising technology for cryptocurrency, NFTs, and other areas. However, there are still many security issues that must be addressed as these technologies evolve.
Casimer DeCusatis +5 more
doaj +2 more sources
Generation of a dataset for DoW attack detection in serverless architectures [PDF]
Denial of Wallet (DoW) attacks refers to a type of cyberattack that aims to exploit and exhaust the financial resources of an organization by triggering excessive costs or charges within their cloud or serverless computing environment.
José Manuel Ortega Candel +2 more
doaj +2 more sources
Companies’ Crypto wallets Identification for Auditing Purposes
The article examines the problem of identifying the crypto wallet of an audited organization, which is becoming increasingly important and relevant as crypto economy develops.
A. V. Tetyushin
doaj +2 more sources

