Results 21 to 30 of about 290,193 (257)

SSHCure: a flow-based SSH intrusion detection system [PDF]

open access: yes, 2012
SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity.
Hellemons, Laurens   +6 more
core   +5 more sources

Securing smart home against sinkhole attack using weight‐based IDS placement strategy

open access: yesIET Wireless Sensor Systems, 2023
Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and comfortable. Yet, these resource‐constrained devices are prone to manifold security attacks.
Md. Shafiqul Islam   +3 more
doaj   +1 more source

Support Vector Machine for Network Intrusion and Cyber-Attack Detection [PDF]

open access: yes, 2017
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-security threats are a growing concern in networked environments.
Aparicio-Navarro, Francisco J.   +4 more
core   +2 more sources

IoT Network Attack Detection and Mitigation [PDF]

open access: yes2020 9th Mediterranean Conference on Embedded Computing (MECO), 2020
Cyberattacks on the Internet of Things (IoT) can cause major economic and physical damage, and disrupt production lines, manufacturing processes, supply chains, impact the physical safety of vehicles, and damage the health of human beings. Thus we describe and evaluate a distributed and robust attack detection and mitigation system for network ...
Erol Gelenbe   +6 more
openaire   +2 more sources

Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]

open access: yes, 2014
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim   +3 more
core   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

A BiLSTM-Based DDoS Attack Detection Method for Edge Computing

open access: yesEnergies, 2022
With the rapid development of smart grids, the number of various types of power IoT terminal devices has grown by leaps and bounds. An attack on either of the difficult-to-protect end devices or any node in a large and complex network can put the grid at
Yiying Zhang   +5 more
doaj   +1 more source

Detection Method of DDoS Attack Based on Software Defined Network and Its Application [PDF]

open access: yesJisuanji gongcheng, 2016
According to the characteristics of Distributed Denial of Service(DDoS) attack and OpenFlow technology,this paper proposes a novel DDoS attack detection method based on Software Defined Network(SDN).It gets flow-table item installed in OpenFlow switch ...
LI Hefei,HUANG Xinli,ZHENG Zhengqi
doaj   +1 more source

A distributed scheme to detect wormhole attacks in mobile wireless sensor networks [PDF]

open access: yes, 2011
Due to mostly being unattended, sensor nodes become open to physical attacks such as wormhole attack, which is our focus in this paper. Various solutions are proposed for wormhole attacks in sensor networks, but only a few of them take mobility of sensor
Levi, Albert, Simsek, Oya, Şimşek, Oya
core   +2 more sources

An Improved Recurrent Neural Network for Industrial IoT Botnet Attack Detection

open access: yesЖурнал інженерних наук
This research aims to improve the Industrial Internet of Things (IIoT) security, which fosters technological confidence and promotes expansion. The IIoT is mainly used in manufacturing, oil, and gas to avoid botnet attacks.
G. Suneetha, D.H. Priya
doaj   +1 more source

Home - About - Disclaimer - Privacy