Academic literature on the topic 'Resource consumption attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Resource consumption attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Resource consumption attack"

1

Gao, Minyan, Liton Kumar Biswas, Navid Asadi, and Domenic Forte. "Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource." Cryptography 8, no. 2 (2024): 13. http://dx.doi.org/10.3390/cryptography8020013.

Full text
Abstract:
Recent decades have witnessed a remarkable pace of innovation and performance improvements in integrated circuits (ICs), which have become indispensable in an array of critical applications ranging from military infrastructure to personal healthcare. Meanwhile, recent developments have brought physical security to the forefront of concern, particularly considering the valuable assets handled and stored within ICs. Among the various invasive attack vectors, micro-probing attacks have risen as a particularly menacing threat. These attacks leverage advanced focused ion beam (FIB) systems to enabl
APA, Harvard, Vancouver, ISO, and other styles
2

Moataz, H. Khalil, Azab Mohamed, Elsayed Ashraf, Sheta Walaa, Gabr Mahmoud, and S. Elmaghraby Adel. "MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS." International Journal of Computer Networks & Communications (IJCNC) 11, no. 6 (2019): 1–22. https://doi.org/10.5281/zenodo.3564217.

Full text
Abstract:
The popularity of cloud computing has been growing where the cloud became an attractive alternative rather than classic information processing system. The distributed denial of service (DDoS) attack is one of the famous attacks to cloud computing. This paper proposes a Multiple Layer Defense (MLD) scheme to detect and mitigate DDoS attacks which due to resource depletion. The MLD consists of two layers. The first layer has an alarm system send alarms to cloud management when DDoS attacks start. The second layer includes an anomaly detection system detects VM is infected by DDoS attacks. Also,M
APA, Harvard, Vancouver, ISO, and other styles
3

Padmaja, K., and K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment." Webology 18, no. 2 (2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.

Full text
Abstract:
Cloud computing shares the resource in information technology field. The existing technique is failed to provide better results for identifying unknown attacks with higher accuracy and lesser time consumption. In order to address these problems, Radial Basis Kernel Regressive Feature Extracted Brown Boost Classification (RBKRFEBBC) method is introduced for performing the attack detection in cloud computing. The main objective of RBKRFEBBC method is to improve the attack detection performance with higher accuracy and minimal time consumption. Dichotomous radial basis kernelized regressive funct
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Sungbeen, and Dohoon Kim. "Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System." Sensors 23, no. 6 (2023): 2914. http://dx.doi.org/10.3390/s23062914.

Full text
Abstract:
Current railroad customs clearance systems are problematic in that the movement of trains is occasionally restricted for extended periods during inspections to verify cargo integrity at customs clearance. Consequently, significant human and material resources are consumed to obtain customs clearance to the destination, considering different processes exist for cross-border trade. Therefore, we developed a cross-border blockchain-based non-stop customs clearance (NSCC) system to address these delays and reduce resource consumption for cross-border trains. The integrity, stability, and traceabil
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Yanshuo, Liqiu Li, Hengyu Bao, Xiaohong Qin, Zhiyuan Zhang, and Xiaoyi Duan. "IAESR: IoT-oriented authenticated encryption based on iShadow round function." PeerJ Computer Science 11 (June 11, 2025): e2947. https://doi.org/10.7717/peerj-cs.2947.

Full text
Abstract:
With the growing popularity of the Internet of Things (IoT) devices and the widespread application of embedded systems, the demand for security and resource efficiency in these devices is also increasing. Traditional authenticated encryption (AE) algorithms are often unsuitable for lightweight devices due to their complexity and resource consumption, creating a need for lightweight AE algorithms. Lightweight devices typically have limited processing power, storage capacity, and energy resources, which necessitates the design of simple and efficient encryption algorithms that can function withi
APA, Harvard, Vancouver, ISO, and other styles
6

Shruthi, R., and Z. Khan Prof.Rasheeda. "Preventing X-DoS attack on Cloud using Reputation-Based Technology." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 68–75. https://doi.org/10.5281/zenodo.581759.

Full text
Abstract:
<em>Cloud computing is a vast system which provides service based on usage to any number of users from any place using any device. But due to third party interference for maintenance and storage there are numerous denial of service attacks and other security attacks which affects not only the quality but also the cost due to resource consumption. And moreover the cost keeps increasing as long as the DoS attack is not detected at the earliest possible stage. Even though there are many security solutions to keep the attacks away still the DoS attacks take place stealthily due to some point of we
APA, Harvard, Vancouver, ISO, and other styles
7

Garcia Ribera, Eric, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, and Vassilios G. Vassilakis. "An Intrusion Detection System for RPL-Based IoT Networks." Electronics 11, no. 23 (2022): 4041. http://dx.doi.org/10.3390/electronics11234041.

Full text
Abstract:
The Internet of Things (IoT) has become very popular during the last decade by providing new solutions to modern industry and to entire societies. At the same time, the rise of the industrial Internet of Things (IIoT) has provided various benefits by linking infrastructure around the world via sensors, machine learning, and data analytics. However, the security of IoT devices has been proven to be a major concern. Almost a decade ago, the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was designed to handle routing in IoT and IIoT. Since then, numerous types of attacks on RPL hav
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Hongyu, Xiaoning Feng, and Jiale Zhang. "Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack." Entropy 26, no. 3 (2024): 216. http://dx.doi.org/10.3390/e26030216.

Full text
Abstract:
The SAND algorithm is a family of lightweight AND-RX block ciphers released by DCC in 2022. Our research focuses on assessing the security of SAND with a quantum computation model. This paper presents the first quantum implementation of SAND (including two versions of SAND, SAND-64 and SAND-128). Considering the depth-times-width metric, the quantum circuit implementation of the SAND algorithm demonstrates a relatively lower consumption of quantum resources than that of the quantum implementations of existing lightweight algorithms. A generalized Grover-based brute-force attack framework was i
APA, Harvard, Vancouver, ISO, and other styles
9

Kannan, Charulatha, Rajendiran Muthusamy, Vimala Srinivasan, Vivek Chidambaram, and Kiruthika Karunakaran. "Machine learning based detection of DDoS attacks in software defined network." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 3 (2023): 1503. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1503-1511.

Full text
Abstract:
&lt;span&gt;Nowadays, software defined networking (SDN) offers benefits in the area so fautomation, elasticity, and resource consumption. However, evidenceis there that SDN controller may undergo certain defeat for the network structure, particularly as the yare targeted by attacks like denial of service (DoS). Due to this network traffic has increased tremendously and attacked the server severely. To handle this issue, weused the Ryu controller and Mininet tool to identify and all eviate the DoS attack by the machine learning (ML) algorithm. Since ML is deemed as themain method for detecting
APA, Harvard, Vancouver, ISO, and other styles
10

Shi, Haibin, Guang Cheng, Ying Hu, Fuzhou Wang, and Haoxuan Ding. "RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network." Security and Communication Networks 2021 (July 27, 2021): 1–10. http://dx.doi.org/10.1155/2021/9409473.

Full text
Abstract:
With the great changes in network scale and network topology, the difficulty of DDoS attack detection increases significantly. Most of the methods proposed in the past rarely considered the real-time, adaptive ability, and other practical issues in the real-world network attack detection environment. In this paper, we proposed a real-time adaptive DDoS attack detection method RT-SAD, based on the response to the external network when attacked. We designed a feature extraction method based on sketch and an adaptive updating algorithm, which makes the method suitable for the high-speed network e
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Resource consumption attack"

1

Jiao, Libin, Yonghua Huo, Ningling Ge, Zhongdi Ge, and Yang Yang. "A Resource Consumption Attack Identification Method Based on Data Fusion." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73562-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abdelhaq, Maha, Rosilah Hassan, and Raed Alsaqour. "Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET." In Software Engineering and Computer Systems. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22203-0_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Woodhouse, Stephen, and Mostyn Brown. "The Impact of Digitalization." In The Palgrave Handbook of International Energy Economics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-86884-0_30.

Full text
Abstract:
AbstractPrevious energy transformations have been driven by the exploitation of a new energy resource. In contrast, although the digitalization of energy is delivering cost reductions in the supply and transportation of energy; digitalization is truly transformational because it brings the demand side into play, facilitating the move to a more integrated, highly flexible and customer-centric energy system which will ultimately unlock deep decarbonization of our societies. This fertile new energy landscape will be dominated by data-rich organizations able to establish direct relationships with
APA, Harvard, Vancouver, ISO, and other styles
4

"Research on resource consumption attack detection and defend." In Control Engineering and Information Systems. CRC Press, 2015. http://dx.doi.org/10.1201/b17732-138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jain, Rachna. "Apprising Trust Key Management in IoT Cross-Layer Framework." In Transforming the Internet of Things for Next-Generation Smart Systems. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7541-3.ch002.

Full text
Abstract:
Internet of things (IoT) networks is the buzzword these days in Industry 4.0. IoT nodes are resource constrained and should be light enough to minimize the power consumption. IoT paradigm does not depend on human intervention at each and every step. There is a need of “trust” between communicating entities. Devices at physical layer are vulnerable to various attacks such as denial of service (DoS) attack, wormhole attack, etc. Trust becomes more important when vulnerability of attacks increases to the devices. This establishment of trust helps in handling risks in a controlled way in unpredict
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Yi, Ningping Mou, Yunjie Ge, and Qian Wang. "Improving Adversarial Transferability with Ghost Samples." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230629.

Full text
Abstract:
Adversarial transferability presents an intriguing phenomenon, where adversarial examples designed for one model can effectively deceive other models. By exploiting this property, various transfer-based methods are proposed to conduct adversarial attacks without knowledge of target models, posing significant threats to practical black-box applications. However, these methods either have limited transferability or require high resource consumption. To bridge the gap, we investigate adversarial transferability from the optimization perspective and propose the ghost sample attack (GSA). GSA impro
APA, Harvard, Vancouver, ISO, and other styles
7

Ameen, Nabeena, and R. Rajagopal. "Secure Boot and Key Management Protocols for IoT Edge Devices." In Lightweight Cryptographic Algorithms for Secure IoT Devices, 2025th ed. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552302-12.

Full text
Abstract:
The proliferation of Internet of Things (IoT) edge devices in critical infrastructure has introduced unprecedented security challenges, particularly in the domains of secure boot and cryptographic key management. Traditional centralized approaches to trust establishment are illsuited for resource-constrained environments characterized by intermittent connectivity, minimal computational capacity, and vulnerability to physical and remote attacks. This chapter explores lightweight secure boot mechanisms and decentralized key management protocols tailored for IoT edge ecosystems, with a focus on a
APA, Harvard, Vancouver, ISO, and other styles
8

Shahid, Hafsa, Humaira Ashraf, N. Z. Jhanjhi, and Qurat-ul Ain Zam Zam. "Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5415-5.ch004.

Full text
Abstract:
Security is a major problem in wireless sensor networks (WSN) because they are vulnerable to a variety of dangerous threats, the deadliest of which is the wormhole assault. These networks support functions like localization and other networking protocols. These networks are made up of many small sensors that collect and share data with central repositories. In such a setting, the detection of wormholes becomes more difficult because of low resource availability in detecting equipment. The authors propose to develop an algorithm for wormhole detection which performs efficiently within the given
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Na'amneh, Qais, Walid Dhifallah, Rahaf Hazaymih, et al. "DIS Flooding Attack Impact in RPL-Based 6LowPAN Network." In Advances in Computational Intelligence and Robotics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-7540-2.ch004.

Full text
Abstract:
Networks that use RPL are vulnerable to security concerns called RPL flood attacks. The IPv6 Routing Protocol for Low-Power and Lossy Networks mitigation technique Secure-RPL is proposed in this study to effectively identify and prevent DIS flooding attacks with minimal overhead. Malicious nodes overload available resources, obstruct communication, and impede data transfer, which may result in performance issues and service outages. It is essential to use countermeasures like message filtering and intrusion detection systems. This chapter shows that the DIS flooding assault increases the netwo
APA, Harvard, Vancouver, ISO, and other styles
10

Talukder, Mohammad Badruddoza, Musfiqur Rahoman Khan, and Sanjeev Kumar. "Socioeconomic Gaps and Foster Inclusive Growth." In Advances in Hospitality, Tourism, and the Services Industry. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5405-6.ch003.

Full text
Abstract:
Sustainable tourism initiatives can help address socioeconomic disparities and promote inclusive growth. These initiatives prioritize social tourism, sustainable consumption, and responsible business practices. By doing so, resource entities can benefit local communities, preserve cultural and natural resources, and contribute to sustainable development. The study involved a literature review, conceptual framework development, research design, data collection, analysis, policy implications, and conclusion. The study considers economic, social, and environmental impacts. However, unplanned tour
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Resource consumption attack"

1

Lazri, Kahina, Sylvie Laniepce, Haiming Zheng, and Jalel Ben-Othman. "AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud." In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC). IEEE, 2014. http://dx.doi.org/10.1109/ucc.2014.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rustogi, Rishabh, Abhishek Agarwal, Ayush Prasad, and Samant Saurabh. "Machine Learning Based Web-Traffic Analysis for Detection of Fraudulent Resource Consumption Attack in Cloud." In WI '19: IEEE/WIC/ACM International Conference on Web Intelligence. ACM, 2019. http://dx.doi.org/10.1145/3350546.3352567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Silva, Antônia Mayara de A. da, Michel Sales Bonfim, Arthur de Castro Callado, and Enyo José T. Gonçalves. "Detection and Mitigation of Attacks at the Edge of IoT Networks Using Deep Learning and P4." In Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbsi.2025.246599.

Full text
Abstract:
Context: The concern for security in IoT networks is becoming increasingly common, considering the accelerated use of these devices in recent years. Problem: Traditional methods for detecting attacks in IoT networks are ineffective due to device heterogeneity. While learning approaches show promise in threat detection, the computational limitations of IoT devices make it challenging to implement these solutions. Solution: This work proposes a deep learning solution for IoT attack detection, focusing on efficient threat mitigation using the Programming Protocol-independent Packet Processors (P4
APA, Harvard, Vancouver, ISO, and other styles
4

Tsiatsikas, Zisis, Georgios Kambourakis, and Dimitris Geneiatakis. "Exposing resource consumption attacks in internet multimedia services." In 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2014. http://dx.doi.org/10.1109/isspit.2014.7446237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Deepan Kumar, Sadhasivam, Vishnu Ramesh Kumar R, Boopathi M, R. Manojkumar, Gobinath R, and Vignesh M. "FPGA Implementation of HLS Crypto Accelerators for Embedded Security in Autonomous Vehicles." In Advances in Design, Materials, Manufacturing and Surface Engineering for Mobility (ADMMS’25). SAE International, 2025. https://doi.org/10.4271/2025-28-0205.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;The growing ubiquity of autonomous vehicles (AVs) has introduced a new attack surface for malicious actors: the embedded systems that govern a vehicle's critical operations. Security breaches in these systems could have catastrophic consequences, potentially leading to loss of control, manipulation of sensor data, or even physical harm. To mitigate these risks, robust cybersecurity measures are paramount. This research delves into a specific threat – side-channel attacks – where attackers exploit data leakage through uni
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Mingtao, and Young B. Moon. "Intrusion Detection of Cyber-Physical Attacks in Manufacturing Systems: A Review." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10135.

Full text
Abstract:
Abstract Cyber-physical manufacturing system is the vision of future manufacturing systems where physical components are fully integrated through various networks and the Internet. The integration enables the access to computation resources that can improve efficiency, sustainability and cost-effectiveness. However, its openness and connectivity also enlarge the attack surface for cyber-attacks and cyber-physical attacks. A critical challenge in defending those attacks is that current intrusion detection methods cannot timely detect cyber-physical attacks. Studies showed that the physical dete
APA, Harvard, Vancouver, ISO, and other styles
7

Pontes, Marcos F., Rodrigo C. Pedrosa, Pedro H. Lopes, and Eduardo J. Luz. "Evaluating Federated Learning with Homomorphic Encryption for Medical Named Entity Recognition Using Compact BERT Models." In Simpósio Brasileiro de Tecnologia da Informação e da Linguagem Humana. Sociedade Brasileira de Computação, 2024. https://doi.org/10.5753/stil.2024.245381.

Full text
Abstract:
Medical Named Entity Recognition (NER) identifies and categorizes medical entities from unstructured texts, crucial for health monitoring tasks. Despite advancements with Large Language Models (LLMs), medical NER faces challenges due to limited and dispersed labeled data across institutions, protected under privacy regulations. Federated Learning (FL) offers a solution by enabling decentralized model training while preserving data privacy, but it is vulnerable to byzantine attacks. This research proposes a simple and secure FL protocol using Homomorphic Encryption (HE), called FedHE, that remo
APA, Harvard, Vancouver, ISO, and other styles
8

Bezerra, Vitor Hugo, Victor G. Turrisi da Costa, Sylvio Barbon Junior, Rodrigo Sanches Miani, and Bruno Bogaz Zarpelão. "One-class Classification to Detect Botnets in IoT devices." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbseg.2018.4242.

Full text
Abstract:
With the increasing number of different Internet of Things devices, new threats to network security emerge due to these devices' low security. Botnets are a widespread threat that takes advantage of IoT devices vulnerabilities to compromise multiple devices and perform coordinated attacks. To tackle this, new methods addressing IoT botnets detection are required. In this paper, we propose a host-based detection system based on one-class classifiers. It was used a One-class Support Vector Machine built with features such as CPU and memory usage to detect malicious activities. The predictive per
APA, Harvard, Vancouver, ISO, and other styles
9

K, Selvamani, Anbuchelian S, Kanimozhi S, Elakkiya R, Bose S, and Kannan A. "A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks." In 2012 International Conference on Systems and Informatics (ICSAI). IEEE, 2012. http://dx.doi.org/10.1109/icsai.2012.6223291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Moncea, Mădălina, Lăcrămioara Drăcea, and Răzvan-Cătălin Dobrea. "Overview on the Impact of Consumer Behavior Decisions on the Tourism Industry in Romania." In 9th BASIQ International Conference on New Trends in Sustainable Business and Consumption. Editura ASE, 2023. http://dx.doi.org/10.24818/basiq/2023/09/072.

Full text
Abstract:
The purpose of the research is to identify the changes that appear from the point of view of consumer behavior in the consumption of tourist services in the post-pandemic period with the analysis carried out on the number of tourist arrivals in Romania, the distribution of the number of tourists on tourist destinations, the capacity of tourist accommodation. and identifying the share of tourism in the Gross Domestic Product of Romania in the period 2008-2020. According to the research carried out, there is a significant decrease in the tourism industry in 2020 due to the COVID-19 pandemic, wit
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Resource consumption attack"

1

Ekström, Thomas. Kunskapsöversikt: Lärdomar från Ukraina med relevans för svensk infrastruktur. Swedish Defence University, 2024. https://doi.org/10.62061/xjyn5209.

Full text
Abstract:
The Russian war in Ukraine is a humanitarian disaster for the Ukrainian people. However, the people, and indeed the whole society, has demonstrated a remarkable resilience. There is consequently much that other countries can learn by studying how Ukraine has been able to muster such resilience in the face of the Russian full-scale invasion. This report focuses on what Swedish authorities in the communications, energy and transportation sectors can learn from what academics, organisations, and nations have already published regarding resilience in critical infrastructure systems. Judging by the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!