To see the other types of publications on this topic, follow the link: Attack mitigation.

Journal articles on the topic 'Attack mitigation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Attack mitigation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bentley, Mark, Alec Stephenson, Peter Toscas, and Zili Zhu. "A Multivariate Model to Quantify and Mitigate Cybersecurity Risk." Risks 8, no. 2 (2020): 61. http://dx.doi.org/10.3390/risks8020061.

Full text
Abstract:
The cost of cybersecurity incidents is large and growing. However, conventional methods for measuring loss and choosing mitigation strategies use simplifying assumptions and are often not supported by cyber attack data. In this paper, we present a multivariate model for different, dependent types of attack and the effect of mitigation strategies on those attacks. Utilising collected cyber attack data and assumptions on mitigation approaches, we look at an example of using the model to optimise the choice of mitigations. We find that the optimal choice of mitigations will depend on the goal—to
APA, Harvard, Vancouver, ISO, and other styles
2

Samer, Moein1, Aaron Gulliver1 T., Gebali1 Fayez, and Alkandari2 Abdulrahman. "Hardware Attack Mitigation Techniques Analysis." International Journal on Cryptography and Information Security (IJCIS) 7, no. 1 (2017): 1–20. https://doi.org/10.5281/zenodo.1186619.

Full text
Abstract:
ABSTRACT The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware attack has capabilities as well as objectives. Some employ hardware trojans, which are inserted during, manufacture, while others monitor system emissions. Once a hardware attack has been identified, mitigation techniques should be employed to protect the system. There are now a wide variety of techniques, which can be used against hardware attacks. In th
APA, Harvard, Vancouver, ISO, and other styles
3

Kadiri, Padmaja, and Seshadri Ravala. "Kernel-Based Machine Learning Models to Predict Mitigation Time During Cloud Security Attacks." International Journal of e-Collaboration 17, no. 4 (2021): 75–88. http://dx.doi.org/10.4018/ijec.2021100106.

Full text
Abstract:
Security threats are unforeseen attacks to the services provided by the cloud service provider. Depending on the type of attack, the cloud service and its associated features will be unavailable. The mitigation time is an integral part of attack recovery. This research paper explores the different parameters that will aid in predicting the mitigation time after an attack on cloud services. Further, the paper presents machine learning models that can predict the mitigation time. The paper presents the kernel-based machine learning models that can predict the average mitigation time during secur
APA, Harvard, Vancouver, ISO, and other styles
4

Dhadhal, Hema, and Dr Paresh Kotak. "Analytical study of effects of DDoS mitigation methods." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 5 (2023): 728–31. http://dx.doi.org/10.54660/.ijmrge.2023.4.5.728-731.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks continue to pose a significant threat to network infrastructure and services. Software Defined Networks (SDNs) have emerged as a promising technology to enhance network flexibility and adaptability. This paper explores various DDoS attack mitigation approaches within the context of SDNs, with a focus on their effectiveness, limitations, and key considerations. The study begins by providing an overview of DDoS attacks and their evolving complexities. It then delves into the fundamental principles of SDNs and their potential advantages in combating DD
APA, Harvard, Vancouver, ISO, and other styles
5

Dhadhal, Hema, and Paresh Kotak. "Leveraging datasets for effective mitigation of DDoS attacks in software-defined networking: significance and challenges." Radioelectronic and Computer Systems 2024, no. 2 (2024): 136–46. http://dx.doi.org/10.32620/reks.2024.2.11.

Full text
Abstract:
Software-Defined Networking (SDN) has emerged as a transformative paradigm for network management, offering centralized control and programmability. However, with the proliferation of Distributed Denial of Service (DDoS) attacks that pose significant threats to network infrastructures, effective mitigation strategies are needed. The subject matter of this study is to explore the importance of datasets in the mitigation of DDoS attacks in SDN environments. The paper discusses the significance of datasets for training machine learning models, evaluating detection mechanisms, and enhancing the re
APA, Harvard, Vancouver, ISO, and other styles
6

Venkatachalam, Nallarasan, and Kottilingam Kottursamy. "Jamming Attack Mitigation in CR-IoT Using Game Theory." Revue d'Intelligence Artificielle 36, no. 4 (2022): 615–20. http://dx.doi.org/10.18280/ria.360414.

Full text
Abstract:
Jamming attack is Cognitive radio Internet of thing network disables the spectrum sharing and reduces the spectrum utilization .detection and mitigation of such attacks is the main component in realizing cognitive radio-based spectrum sharing in cognitive radio-based internet of thing network this work proposes a game theory-based jamming attack mitigation strategy. The problem of jamming attack mitigation is modeled as a zero-sum game and solved by finding Nash equilibrium. The cognitive node which tries to share the spectrum pays the zero-sum game with the jamming attacker and selects the be
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, Deepak, Ankita Sharma, Rashmi Pandey, Deshdeepak Shrivastava, Archana Acharya, and Madhukar Dubey. "ENHANCING COLLABORATIVE MITIGATION OF VOLUMETRIC DDOS ATTACKS AND FAILURE IN MULTI-SDN NETWORKS." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3165–72. http://dx.doi.org/10.21917/ijct.2024.0471.

Full text
Abstract:
Multi-SDN (Software-Defined Networking) architectures offer enhanced flexibility and control over network traffic, which is essential in mitigating Distributed Denial of Service (DDoS) attacks. Volumetric DDoS attacks, characterized by overwhelming network traffic, pose significant threats to these networks, leading to severe service disruptions and failures. Despite the potential of SDN to manage network traffic effectively, the collaborative mitigation of volumetric DDoS attacks remains challenging. Existing solutions often lack coordination among multiple SDN controllers, resulting in ineff
APA, Harvard, Vancouver, ISO, and other styles
8

Shankari, M. Uma, and Dr S. Rethinavalli. "Dynamic Duplication Attack Detection and Mitigation System (DDADMS)." Indian Journal Of Science And Technology 18, no. 18 (2025): 1452–64. https://doi.org/10.17485/ijst/v18i18.535.

Full text
Abstract:
Objectives: To propose a suitable approach to detect, analyse and prevent duplication attacks in cloud computing for effective and secure data management. DDADMS strengthens cloud security and dynamically manages resource usage with real-time de-duplication, machine learning profiling and LSTM prediction. Methods: This study has proposed Dynamic Duplication Attack Detection and Mitigation System (DDADMS) which uses machine learning, hashing, and pattern matching to detect duplicate data when file names and also to change metadata. It develops normal duplication profiles from end-to-end softwar
APA, Harvard, Vancouver, ISO, and other styles
9

Akanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. Researchers have been able to develop several techniques to curb volumetric DDoS which overwhelms the target with a large number of request packets. However, compared to slow DDoS, limited number of research has been executed on mitigating slow DDoS. Attackers have resorted to slow DDoS because it mimics the behaviour of a slow legitimate client thereby causing service unavailability. T
APA, Harvard, Vancouver, ISO, and other styles
10

Zalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.

Full text
Abstract:
This paper discusses an improved mechanism to mitigate the DDoS attack in Mobile Ad-hoc Network (MANET) without compromising the packet delivery ratio. MANET inherently has geographically sparse mobile nodes more vulnerable to various attackers more radically the DDoS type. Moreover it emanates open medium, absence of centralized authority, lack of clear line of defense that leads to more vulnerability towards secure environment. Since there are no hindrances for non-legitimate nodes, which allows them to freely enter and exit from the network at anytime, various active attacks like black hole
APA, Harvard, Vancouver, ISO, and other styles
11

Kang, Liuwang, and Haiying Shen. "Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems." ACM Transactions on Cyber-Physical Systems 6, no. 1 (2022): 1–24. http://dx.doi.org/10.1145/3495534.

Full text
Abstract:
For a modern vehicle, if the sensor in a vehicle anti-lock braking system (ABS) or controller area network (CAN) bus is attacked during a brake process, the vehicle will lose driving direction control and the driver’s life will be highly threatened. However, current methods for detecting attacks are not sufficiently accurate, and no method can provide attack mitigation. To ensure vehicle ABS security, we propose an attack detection method to accurately detect both sensor attack (SA) and CAN bus attack in a vehicle ABS, and an attack mitigation strategy to mitigate their negative effects on the
APA, Harvard, Vancouver, ISO, and other styles
12

Vallabhaneni, Rohith, Sanjaikanth E. Vadakkethil Somanathan Pillai, Srinivas A. Vaddadi, Santosh Reddy Addula, and Bhuvanesh Ananthan. "Optimized deep neural network based vulnerability detection enabled secured testing for cloud SaaS." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1950. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1950-1959.

Full text
Abstract:
Based on the information technology service model, an on-demand services towards user becomes cost effective, which is provided with cloud computing. The network attack is detected with research community that pays huge interest. The novel proposed framework is intended with the combination of mitigation and detection of attack. While enormous traffic is obtainable, extract the relevant fields decide with Software-as-a-service (SaaS) provider. According to the network vulnerability and mitigation procedure, perform deep learning-based attack detection model. The golf optimization algorithm (GO
APA, Harvard, Vancouver, ISO, and other styles
13

Rohith, Vallabhaneni Sanjaikanth E. Vadakkethil Somanathan Pillai Srinivas A. Vaddadi Santosh Reddy Addula Bhuvanesh Ananthan. "Optimized deep neural network based vulnerability detection enabled secured testing for cloud SaaS." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1950–59. https://doi.org/10.11591/ijeecs.v36.i3.pp1950-1959.

Full text
Abstract:
Based on the information technology service model, an on-demand services towards user becomes cost effective, which is provided with cloud computing. The network attack is detected with research community that pays huge interest. The novel proposed framework is intended with the combination of mitigation and detection of attack. While enormous traffic is obtainable, extract the relevant fields decide with Software-as-a-service (SaaS) provider. According to the network vulnerability and mitigation procedure, perform deep learning-based attack detection model. The golf optimization algorithm (GO
APA, Harvard, Vancouver, ISO, and other styles
14

Almerri Mubarak H M M J, Et al. "Security Mechanisms of Distributed Denial-Of-Service (DDOS) Attack in Everything-as-a-Service (XaaS) - Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 438–44. http://dx.doi.org/10.17762/ijritcc.v11i9.8825.

Full text
Abstract:
— This paper illustrates research on DDoS attack which overload targeted servers with traffic to render hosted resources inaccessible and unavailable. The attacks are increasingly being launched from multiple locations, gradually spreading over larger networks, consequently to obscure the attack origin. The precipitous cloud computing as the new ‘anywhere anytime’ paradigm, in the form of Everything-as-a-Service (XaaS), transforms these attack mechanisms to become progressively destructive, affecting Quality Of Service (QoS) performance. The attack vectors examination ranges from volumetric at
APA, Harvard, Vancouver, ISO, and other styles
15

Alfraih Abdulaziz Nasser, A., and Wen Bo Chen. "NTP DRDoS Attack Vulnerability and Mitigation." Applied Mechanics and Materials 644-650 (September 2014): 2875–80. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2875.

Full text
Abstract:
The Network Time Protocol (NTP) is used to synchronize clocks of various computer devices such as personal computers, tablets, and phones based their set time zones. The network of devices that use these NTP servers form a huge distributed network that attracted a number of attacks from late 2013 towards early 2014. This paper presents a hands-on test of the Distributed Reflection Denial of Service (DRDoS) attack by the monlist command, provides more vulnerability in the protocol, and offers mitigation to these vulnerabilities. A Kali Linux server was used to test the monlist command on its lo
APA, Harvard, Vancouver, ISO, and other styles
16

Amaresan, Venkatesan. "Securing Software-Defined Networks Through Dos Attack Type Classification And Mitigation Framework Using Lrs2btm." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 6 (2023): 1–14. https://doi.org/10.5281/zenodo.14005251.

Full text
Abstract:
Software-Defined Networking (SDN) optimizes network management by detecting and mitigating Denial of Service (DoS) attacks. Traditional techniques fail to address specific DoS attack types like DOS Hulk, Benign, DOS Slow HTTP Test, DOS Slowloris, and DOS GoldenEye, leading to ineffective mitigation and network vulnerabilities. To classify DoS attack types and enhance network security, Lasso-Resilience-Ridge Swishmax-based Bidirectional Long-Short Term Memory (LRS2BTM) and Chaos-Shannon-based Elliptical Curve Cryptography (CS-ECC) are used. Initially, the user registration and key generation ar
APA, Harvard, Vancouver, ISO, and other styles
17

Angelakis, Dimitris, Errikos Ventouras, Spyros Kostopoulos, and Pantelis Asvestas. "Cybersecurity Issues in Brain-Computer Interfaces: Analysis of Existing Bluetooth Vulnerabilities." Digital Technologies Research and Applications 3, no. 2 (2024): 115–39. http://dx.doi.org/10.54963/dtra.v3i2.286.

Full text
Abstract:
Brain-computer interfaces (BCIs) hold immense promise for human benefits, enabling communication between the brain and computer-controlled devices. Despite their potential, BCIs face significant cybersecurity risks, particularly from Bluetooth vulnerabilities. This study investigates Bluetooth vulnerabilities in BCIs, analysing potential risks and proposing mitigation measures. Various Bluetooth attacks such as Bluebugging, Bluejacking, Bluesnarfing, BlueBorne, Location Tracking, Man-in-the-Middle Attack, KNOB, BLESA and Reflection Attack are explored, along with their potential consequences o
APA, Harvard, Vancouver, ISO, and other styles
18

Kumar, Aman. "Distributed Denial of Service (DDoS) Attack Mitigation using AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 5706–14. https://doi.org/10.22214/ijraset.2025.69632.

Full text
Abstract:
Abstract: Distributed Denial of Service(DDoS) attacks have been the major threats for the Internet and can bring great loss to companies and governments. With the development of emergingtechnologies, suchascloudcomputing, InternetofThings(IoT), artificialintelligence techniques, attackers can launch a huge volume of DDoS attacks with a lower cost, and it is much harder to detect and prevent DDoS attacks, because DDoS traffic is similar to normal traffic. Naive Bayes and Random Forest trees are two examples of artificial intelligence techniques that have been used to detect and categorize DDoS
APA, Harvard, Vancouver, ISO, and other styles
19

Beg, Omar, Asad Khan, Waqas Rehman, and Ali Hassan. "A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids." Energies 16, no. 22 (2023): 7644. http://dx.doi.org/10.3390/en16227644.

Full text
Abstract:
In this paper, the application and future vision of Artificial Intelligence (AI)-based techniques in microgrids are presented from a cyber-security perspective of physical devices and communication networks. The vulnerabilities of microgrids are investigated under a variety of cyber-attacks targeting sensor measurements, control signals, and information sharing. With the inclusion of communication networks and smart metering devices, the attack surface has increased in microgrids, making them vulnerable to various cyber-attacks. The negative impact of such attacks may render the microgrids out
APA, Harvard, Vancouver, ISO, and other styles
20

Prajwal B, Asha Kumari A, Saravana Kumar E, and Mohit S. "Understanding Botnets: Architecture, Attacks, and Mitigation Strategies." South Asian Journal of Engineering and Technology 15, no. 1 (2025): 1–16. https://doi.org/10.26524/sajet.2025.15.1.

Full text
Abstract:
Botnets represents a significant threat in the cybersecurity landscape. Botnets relies on the set of compromised devices called as bots or zombies which are remotely connected and controlled by the adversary or the hacker. The adversary or the hacker controls the infected devices via a Command and Control(C&C) server. Botnets or bots are known for exploiting the set of vulnerabilities, escalating privileges and permissions in the infected systems and also establishing backdoors. Hackers or adversaries may use botnets to launch large scale cyber-attacks, in most cases it is a type of DOS (D
APA, Harvard, Vancouver, ISO, and other styles
21

Dhanapal, A., and P. Nithyanandam. "The Slow HTTP DDOS Attacks: Detection, Mitigation and Prevention in the Cloud Environment." Scalable Computing: Practice and Experience 20, no. 4 (2019): 669–85. http://dx.doi.org/10.12694/scpe.v20i4.1569.

Full text
Abstract:
Cloud computing is the latest buzzword and cutting-edge technology. The cost-efficiency, easy to operate, on-demand services, availability, makes the cloud so popular. The online web applications based on the internet such as E-Healthcare, E-Commerce are moving to the cloud to reduce the operating investment cost. These applications are vulnerable to slow HTTP Distributed Denial of Service (DDoS) attack in the cloud. This kind of attacks aims to consume the resources of the application as well as the hosting system so that to bring down the services. The various forms of the slow HTTP DDoS are
APA, Harvard, Vancouver, ISO, and other styles
22

Jimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–24. http://dx.doi.org/10.22624/aims/digital/v11n2p2x.

Full text
Abstract:
Network Time Protocol amplification attack is a form of distributed denial-of-service (DDoS) attack in which an attacker exploits or sends a request to a vulnerable NTP server by using their IP address to flood a targeted network or server with an overwhelming volume of User Datagram Protocol (UDP) traffic. In the past, the techniques that involved reflecting traffic off NTP servers to the victim, with the attacker hiding their identity by spoofing the source IP address were carried out using mainly Domain Name Server (DNS) servers but the use of vulnerable NTP servers as reflectors in DDoS at
APA, Harvard, Vancouver, ISO, and other styles
23

Jimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–36. http://dx.doi.org/10.22624/aims/digital/v11n2p2.

Full text
Abstract:
Network Time Protocol amplification attack is a form of distributed denial-of-service (DDoS) attack in which an attacker exploits or sends a request to a vulnerable NTP server by using their IP address to flood a targeted network or server with an overwhelming volume of User Datagram Protocol (UDP) traffic. In the past, the techniques that involved reflecting traffic off NTP servers to the victim, with the attacker hiding their identity by spoofing the source IP address were carried out using mainly Domain Name Server (DNS) servers but the use of vulnerable NTP servers as reflectors in DDoS at
APA, Harvard, Vancouver, ISO, and other styles
24

Tas, Ismail Melih, and Selcuk Baktir. "A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack." Applied Sciences 13, no. 3 (2023): 1864. http://dx.doi.org/10.3390/app13031864.

Full text
Abstract:
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are widely deployed technologies since they provide an efficient and fast means of both voice and data communication over a single network. However, in spite of their advantages, they also have their security threats due to the inherent vulnerabilities in the underlying Internet Protocol (IP) that can potentially be exploited by hackers. This study introduces a novel defense mechanism to effectively combat advanced attacks that exploit vulnerabilities identified in some less-known features of SIP. The SIP-
APA, Harvard, Vancouver, ISO, and other styles
25

Asia Ayaz Andrabi, Syed, Sachi Pandey, and Akthar Nazir. "A review on mitigation of the DDoS Attack in cloud in regulated environment." International Journal of Engineering & Technology 7, no. 2.8 (2018): 497. http://dx.doi.org/10.14419/ijet.v7i2.8.10492.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks are aimed at exhausting various resources of victim hosts, thereby preventing legitimate usage of their computational capabilities. In this paper, a proper and systematic mitigation technique presented to mitigate the DDoS attack in cloud environment. A robust mechanism is presented which consists of software based puzzle generation method to validate the real customer of cloud services provider from non-reals’ ones to provide better DDoS attack mitigation solution.
APA, Harvard, Vancouver, ISO, and other styles
26

R, Murugesan*1 Dr M. Vijayaraj2 &. Dr. K. Vetrivel. "MULTI ATTRIBUTE MINIMUM THROTTLE APPROXIMATION BASED SINKHOLE DETECTION IN MOBILE ADHOC NETWORKS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 6 (2017): 455–63. https://doi.org/10.5281/zenodo.814697.

Full text
Abstract:
The presence of sinkhole attack in mobile adhoc network affects the quality of service of the network and the problem of mitigating sinkhole attack has been handled with different strategies. Still the methods suffers to achieve the mitigation performance and to overcome this issue, an efficient multi attribute minimum throttle approximation algorithm is presented in this paper. The method performs mitigation of sink hole attacks in distributed manner which improves the quality of service of the network. Each node maintains the trace about node energy, node location, displacement speed, and nu
APA, Harvard, Vancouver, ISO, and other styles
27

Kumar, Adithyan Arun, Gowthamaraj Rajendran, Nitin Srinivasan, Praveen Kumar Sridhar, and Kishore Kumar Perumalsamy. "Survey of Attacks against HTTPS: Analysis, Exploitation, and Mitigation Strategies." International Journal of Innovative Technology and Exploring Engineering 13, no. 4 (2024): 28–34. http://dx.doi.org/10.35940/ijitee.d9826.13040324.

Full text
Abstract:
This research paper aims to provide a comprehensive overview of known attacks against HTTPS, focusing on the SSL and TLS protocols. The paper begins by explaining the working of HTTPS, followed by detailed descriptions of SSL and TLS protocols. Subsequently, it explores common attacks against HTTPS, providing an in-depth analysis of each attack, along with proof-of-concept (PoC) demonstrations. Furthermore, the paper outlines mitigation strategies to address each attack, emphasizing the importance of proactive security measures. Finally, a conclusion is drawn, highlighting the evolving nature
APA, Harvard, Vancouver, ISO, and other styles
28

Adithyan, Arun Kumar. "Survey of Attacks Against HTTPS: Analysis, Exploitation, and Mitigation Strategies." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 13, no. 4 (2024): 28–34. https://doi.org/10.35940/ijitee.D9826.13040324.

Full text
Abstract:
<strong>Abstract:</strong> This research paper aims to provide a comprehensive overview of known attacks against HTTPS, focusing on the SSL and TLS protocols. The paper begins by explaining the working of HTTPS, followed by detailed descriptions of SSL and TLS protocols. Subsequently, it explores common attacks against HTTPS, providing an in-depth analysis of each attack, along with proof-of-concept (PoC) demonstrations. Furthermore, the paper outlines mitigation strategies to address each attack, emphasizing the importance of proactive security measures. Finally, a conclusion is drawn, highli
APA, Harvard, Vancouver, ISO, and other styles
29

Kela, Rushabh, Abhinav Chawla, Pratishtha Gaur, and Dr Manikandan K. "IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS." international journal of advanced research in computer science 13, no. 4 (2022): 28–34. http://dx.doi.org/10.26483/ijarcs.v13i4.6890.

Full text
Abstract:
Cyber threats have increased drastically in the recent years and the most common targets are organisation applications or systems for data theft, disrupting the operations or any other malicious use. Incorporating website security prevents these sorts of attacks on the system. It is the act/practice of protecting websites from unauthorized access, use, modification, destruction, or disruption. A web application will be created and tested on various attacks such as Brute Force Dictionary attack, Denial-of-Service attacks, Cross Site Scripting (XSS) attack, NoSQL injections and WebSocket attacks
APA, Harvard, Vancouver, ISO, and other styles
30

Subramaniam.T.K and Deepa.B. "SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS." SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS 7, no. 1 (2022): 11. https://doi.org/10.5281/zenodo.6700029.

Full text
Abstract:
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks vulnerabilities and improve the security. This study discuss about the different types of attacks that affects the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
APA, Harvard, Vancouver, ISO, and other styles
31

Minh, Huong Nguyen, Tran Hoang Tung, Huynh Vinh Nam, and Pham Thanh Giang. "A Defense System: Jamming Detection and Mitigation for Safety Applications in Vehicular Networks." International Journal of Emerging Technology and Advanced Engineering 13, no. 2 (2023): 33–39. http://dx.doi.org/10.46338/ijetae0223_05.

Full text
Abstract:
The periodically exchanged basic safety messages (BSM) in vehicular networks have become a new attack target for jamming attacks that are easy to conduct in a vehicular environment. The detection and mitigation must be cordially integrated to provide acceptable communication latency under attacking conditions. This paper considers a comprehensive defense system detecting and mitigating jamming attacks. We analyze the impact of the jamming attack on BSMs on our initially proposed random channel surfing scheme coupling with a detection method. The detection method can hardly provide 100% accurac
APA, Harvard, Vancouver, ISO, and other styles
32

Xu, Lezhong, Yupeng Zhu, Zhuoyu Li, and Quanqi Zhang. "Safety Control for Cyber–Physical Systems Under False Data Injection Attacks." Electronics 14, no. 6 (2025): 1103. https://doi.org/10.3390/electronics14061103.

Full text
Abstract:
Cyber–physical systems (CPSs) are increasingly susceptible to cyber threats, especially false data injection (FDI) attacks, which can compromise their stability and safety. Ensuring system safety while mitigating such attacks is a critical challenge. In the paper, we address the safety control issue for CPSs by designing a control strategy that considers both false data injection attacks and physical safety constraints. A baseline controller is first designed to guarantee system stability when there are no attacks and when the safety constraints are satisfied. To address FDI attacks, we propos
APA, Harvard, Vancouver, ISO, and other styles
33

Kadam, Asmita. "SDN-Driven Security Framework for DDOS Attack Detection and Mitigation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 620–25. http://dx.doi.org/10.22214/ijraset.2024.65142.

Full text
Abstract:
The rising complexity and persistence of Distributed Denial of Service (DDoS) attacks, particularly low-rate variants, present significant challenges in detection and mitigation within Software-Defined Networking (SDN) environments. Existing detection systems often flood networks with alerts, burdening security personnel and delaying timely mitigation. Furthermore, many solutions are designed and tested in simulated conditions, limiting their real-world applicability. To address these challenges, we propose an SDN-based security framework enhanced with automated monitoring, detection, and miti
APA, Harvard, Vancouver, ISO, and other styles
34

Abdul, Khadar A., Shrishail Math Dr., Brahmananda S. H. Dr., and Shivamurthy G. Dr. "Website Vulnerability Detection: Inception of Mitigation of Advanced Persistent Threats." Solid State Technology 63, no. 6 (2020): 7902. https://doi.org/10.5281/zenodo.7549581.

Full text
Abstract:
There are four basic stages of Advanced Persistent Threat attacks Study, Spear, Search and Sabotage. The study stage is executed with intent to acquire as much information as possible about attack target through various methods. One of the most successful methods is to gather the vulnerabilities of the target website. To counter the APTs the very basic solution is to detect the vulnerabilities present in the website and build an attack proof website to further shorten the chance of APT attacks. Vulnerability is a weakness that exists in the computer component upon exploiting which the attacker
APA, Harvard, Vancouver, ISO, and other styles
35

Moein, Samer, T. Aaron Gulliver, Fayez Gebali, and Abdulrahman Alkandari. "Hardware Attack Mitigation Techniques Analysis." International Journal on Cryptography and Information Security 7, no. 1 (2017): 9–28. http://dx.doi.org/10.5121/ijcis.2017.7102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mukhtar, Husameldin, Khaled Salah, and Youssef Iraqi. "Mitigation of DHCP starvation attack." Computers & Electrical Engineering 38, no. 5 (2012): 1115–28. http://dx.doi.org/10.1016/j.compeleceng.2012.06.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Dhanaraj, Rajesh Kumar, Rutvij H. Jhaveri, Lalitha Krishnasamy, Gautam Srivastava, and Praveen Kumar Reddy Maddikunta. "Black-Hole Attack Mitigation in Medical Sensor Networks Using the Enhanced Gravitational Search Algorithm." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 29, Supp02 (2021): 297–315. http://dx.doi.org/10.1142/s021848852140016x.

Full text
Abstract:
In today’s world, one of the most severe attacks that wireless sensor networks (WSNs) face is a Black-Hole (BH) attack which is a type of Denial of Service (DoS) attack. This attack blocks data and injects infected programs into a set of sensors in a group to capture packets before reached to the target. Therefore, raw data in the BH region is thwarted and is unable to reach its destination. The network is susceptible to various types of attacks as it is accessible to all types of users and minimizing the energy depletion without compromising the network lifetime is an NP-hard problem. Even th
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, R. Dhileep. "ML Based Detection & Classification of High- and Low-Rate DDoS Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41808.

Full text
Abstract:
The Machine Learning-Based Detection and Classification of High-Rate (HR) and Low-Rate (LR) DDoS Attacks system is designed to strengthen network security by identifying and categorizing different types of attack traffic. This intelligent detection framework leverages machine learning techniques to analyze network behaviour and distinguish between legitimate and malicious requests. The system utilizes the XGBoost classifier to accurately classify HR attacks, which generate overwhelming traffic surges causing immediate disruptions, and LR attacks, which operate subtly to evade traditional detec
APA, Harvard, Vancouver, ISO, and other styles
39

Harmeet Singh, Er, and Dr Vijay Dhir. "A Novel Hybrid and Secure Clustering Black hole Attacks Mitigation Technique in Wireless LAN." International Journal of Engineering & Technology 7, no. 4.7 (2018): 389. http://dx.doi.org/10.14419/ijet.v7i4.7.23035.

Full text
Abstract:
Wireless LAN is a dynamic network with large number of mobile nodes. As the traffic increases over the wireless, it will lead to number of problems like congestion and packet loss. This congestion and packet loss problems occurs due to the attacks in wireless LAN.Out of the various attacks black hole attack is most dangerous attack which drops all of the packets received from the source node and which act as a black hole in the universe. In this paper we are providing solution against this attack. We propose a Novel Hybrid and Secure Clustering Black hole Attack Mitigation Technique in Wireles
APA, Harvard, Vancouver, ISO, and other styles
40

T. Ramya. "Review on DDOS Attacks in IOT Networks." Power System Technology 48, no. 4 (2024): 2400–2428. https://doi.org/10.52783/pst.1137.

Full text
Abstract:
A Distributed Denial of Service (DDoS) attacks are harmful effort to disrupt standard networks, servers, or service operations by flooding the system with excessive Internet traffic. A DDoS attack sends a lot of traffic to the target at once utilizing several hacked computers or devices ("botnets"), robbing genuine users of their service. More connectivity and convenience across a range of industries has resulted from the widespread use of Internet of Things (IoT) devices. IoT networks are vulnerable to attacks due to their inherent vulnerabilities, and one major danger is DDoS attacks. In the
APA, Harvard, Vancouver, ISO, and other styles
41

Zhang, Zhewen, Yao Liu, Yuhan She, Abdurrashid Ibrahim Sanka, Patrick S. Y. Hung, and Ray C. C. Cheung. "ConBOOM: A Configurable CPU Microarchitecture for Speculative Covert Channel Mitigation." Electronics 14, no. 5 (2025): 850. https://doi.org/10.3390/electronics14050850.

Full text
Abstract:
Speculative execution attacks are serious security problems that cause information leakage in computer systems by building speculative covert channels. Hardware defenses mitigate speculative covert channels through microarchitectural changes. However, two main limitations become the major bottleneck in existing hardware defenses. High-security hardware defenses, such as eager delay, can effectively mitigate both known and unknown covert channels. However, these defenses incur high performance overhead due to the long-fixed delayed execution applied in all potential attack scenarios. In contras
APA, Harvard, Vancouver, ISO, and other styles
42

de Caldas Filho, Francisco Lopes, Samuel Carlos Meneses Soares, Elder Oroski, et al. "Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning." Sensors 23, no. 14 (2023): 6305. http://dx.doi.org/10.3390/s23146305.

Full text
Abstract:
The Internet of Things (IoT) introduces significant security vulnerabilities, raising concerns about cyber-attacks. Attackers exploit these vulnerabilities to launch distributed denial-of-service (DDoS) attacks, compromising availability and causing financial damage to digital infrastructure. This study focuses on mitigating DDoS attacks in corporate local networks by developing a model that operates closer to the attack source. The model utilizes Host Intrusion Detection Systems (HIDS) to identify anomalous behaviors in IoT devices and employs network-based intrusion detection approaches thro
APA, Harvard, Vancouver, ISO, and other styles
43

M., Uma Shankari, and S. Rethinavalli Dr. "Dynamic Duplication Attack Detection and Mitigation System (DDADMS)." Indian Journal of Science and Technology 18, no. 18 (2025): 1452–64. https://doi.org/10.17485/IJST/v18i18.535.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;To propose a suitable approach to detect, analyse and prevent duplication attacks in cloud computing for effective and secure data management. DDADMS strengthens cloud security and dynamically manages resource usage with real-time de-duplication, machine learning profiling and LSTM prediction.&nbsp;<strong>Methods:</strong>&nbsp;This study has proposed Dynamic Duplication Attack Detection and Mitigation System (DDADMS) which uses machine learning, hashing, and pattern matching to detect duplicate data when file names and also to change metadata. It de
APA, Harvard, Vancouver, ISO, and other styles
44

Sangeetha, Prabhu, and P. S. Nethravathi. "A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model." International Journal of Applied Engineering and Management Letters (IJAEML) 6, no. 1 (2022): 149–59. https://doi.org/10.5281/zenodo.6349848.

Full text
Abstract:
<strong>Purpose: </strong><em>When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An Intrusion Detection System is critical for identifying and blocking attacks in IoT networks. As a result, utilizing a unique Classification and Encryption approach, this article offered a novel architecture for attack node mitigation.</em> <strong>Design/Methodology/Approach</strong>: <em>This study reviews the current status of various cyber-attack detection models and their m
APA, Harvard, Vancouver, ISO, and other styles
45

Wani, Sharyar, Mohammed Imthiyas, Hamad Almohamedh, Khalid M. Alhamed, Sultan Almotairi, and Yonis Gulzar. "Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight." Symmetry 13, no. 2 (2021): 227. http://dx.doi.org/10.3390/sym13020227.

Full text
Abstract:
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate requests on any network. Although the first DDoS attack was reported in 1996, the complexity and sophistication of these attacks has been ever increasing. A 2 TBps attack was reported in mid-August 2020 directed towards critical infrastructure, such as finance, amidst the COVID-19 pandemic. It is estimated that these attacks will double, reaching over 15 million, in the next 2 years. A number of mitigation schemes have been designed and developed since its inception but the increasing complexity demand
APA, Harvard, Vancouver, ISO, and other styles
46

El-Zoghby, Ayman M., Mahmoud Said ElSayed, Anca Jurcut, and Marianne A. Azer. "Overview of the Code-Reuse Attacks Mitigations, and Evaluation using SMAA-2 Approach." Advances in Knowledge-Based Systems, Data Science, and Cybersecurity 02, no. 01 (2025): 108–48. https://doi.org/10.54364/cybersecurityjournal.2025.1106.

Full text
Abstract:
Exploiting modern software requires sophisticated attack vectors to bypass software protection mechanisms. Code-reuse Attacks (CRAs) are a widely used approach to attack modern software, even after applying memory protection defenses. The underlying vulnerabilities in the software codes or design enable the use of the program’s own code and manipulation of data and code. This paper covers the foundation of memory-based attacks and provides an extensive overview of memory safety issues and exploitation methods, as well as the foundation of control flow attacks and different categories of code-r
APA, Harvard, Vancouver, ISO, and other styles
47

Zhang, Jian, Qidi Liang, Rui Jiang, and Xi Li. "A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors." Applied Sciences 9, no. 21 (2019): 4633. http://dx.doi.org/10.3390/app9214633.

Full text
Abstract:
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks. Therefore, improving the ubiquitous detection capability of DDoS attacks and accurately and quickly identifying DDoS attack traffic play an important role in later attack mitigation. This paper proposes a method to efficiently detect and identify multivector DDoS attacks. The detection algorithm is applicable to known and unknown DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
48

Rajesh, Kumar* Dr. Raman Chadha. "MITIGATION OF BLACK HOLE ATTACK USING GENERIC ALGORITHMS AND FUZZY LOGIC." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 6 (2016): 818–26. https://doi.org/10.5281/zenodo.56021.

Full text
Abstract:
A black hole is a node that always responds positively to every PREQ, even though it does not really have a valid route to the destination node. Since a black hole does not have to check its routing table, it is the first to respond to the PREQ in most cases. There are two sorts of black hole attack could be defined in AODV with the purpose of differentiate the type of black hole attack.&nbsp; At present, several efficient routing protocols have been proposed for VANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networ
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Jishuai, Sujuan Qin, Tengfei Tu, Hua Zhang, and Yongsheng Li. "Packet Injection Exploiting Attack and Mitigation in Software-Defined Networks." Applied Sciences 12, no. 3 (2022): 1103. http://dx.doi.org/10.3390/app12031103.

Full text
Abstract:
Software-defined networking (SDN) decouples the control plane and data plane through OpenFlow technology and allows flexible network control. It has been widely applied in different areas and has become a focus of attention in the future network. With SDN’s development, its security problem has become a necessary point of research to be solved urgently. In this paper, we propose a novel attack, namely, the packet injection exploiting attack. By maliciously injecting false hosts into SDN network topology, attackers can further use them to launch a denial of service (DoS) attack. The consequence
APA, Harvard, Vancouver, ISO, and other styles
50

Zaen, Mohammad Taufan Asri, Ahmad Tantoni, and Maulana Ashari. "DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS." JISA(Jurnal Informatika dan Sains) 4, no. 2 (2021): 149–54. http://dx.doi.org/10.31326/jisa.v4i2.1043.

Full text
Abstract:
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing the performance of IS/IT used. The development of IoT in the industrial revolution 4.0, which is all online, is a challenge in itself, from a negative point of view, all of them are able to carry out attacks on ISP servers, often carried out by hackers. DDoS (Distributed Denial of Service) attacks are the most common attacks. The development of
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!