SSHCure: a flow-based SSH intrusion detection system [PDF]
SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity.
Hellemons, Laurens +6 more
core +5 more sources
Securing smart home against sinkhole attack using weight‐based IDS placement strategy
Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource‐constrained devices are prone to manifold security attacks.
Md. Shafiqul Islam +3 more
doaj +1 more source
Support Vector Machine for Network Intrusion and Cyber-Attack Detection [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-security threats are a growing concern in networked environments.
Aparicio-Navarro, Francisco J. +4 more
core +2 more sources
IoT Network Attack Detection and Mitigation [PDF]
Cyberattacks on the Internet of Things (IoT) can cause major economic and physical damage, and disrupt production lines, manufacturing processes, supply chains, impact the physical safety of vehicles, and damage the health of human beings. Thus we describe and evaluate a distributed and robust attack detection and mitigation system for network ...
Erol Gelenbe +6 more
openaire +2 more sources
Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim +3 more
core +1 more source
Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David +3 more
core +1 more source
A BiLSTM-Based DDoS Attack Detection Method for Edge Computing
With the rapid development of smart grids, the number of various types of power IoT terminal devices has grown by leaps and bounds. An attack on either of the difficult-to-protect end devices or any node in a large and complex network can put the grid at
Yiying Zhang +5 more
doaj +1 more source
Detection Method of DDoS Attack Based on Software Defined Network and Its Application [PDF]
According to the characteristics of Distributed Denial of Service(DDoS) attack and OpenFlow technology,this paper proposes a novel DDoS attack detection method based on Software Defined Network(SDN).It gets flow-table item installed in OpenFlow switch ...
LI Hefei,HUANG Xinli,ZHENG Zhengqi
doaj +1 more source
A distributed scheme to detect wormhole attacks in mobile wireless sensor networks [PDF]
Due to mostly being unattended, sensor nodes become open to physical attacks such as wormhole attack, which is our focus in this paper. Various solutions are proposed for wormhole attacks in sensor networks, but only a few of them take mobility of sensor
Levi, Albert, Simsek, Oya, Şimşek, Oya
core +2 more sources
An Improved Recurrent Neural Network for Industrial IoT Botnet Attack Detection
This research aims to improve the Industrial Internet of Things (IIoT) security, which fosters technological confidence and promotes expansion. The IIoT is mainly used in manufacturing, oil, and gas to avoid botnet attacks.
G. Suneetha, D.H. Priya
doaj +1 more source

