2021 IEEE 10th Global Conference on Consumer Electronics (GCCE) 2021
DOI: 10.1109/gcce53005.2021.9621895
|View full text |Cite
|
Sign up to set email alerts
|

Machine-Learning-Based White-Hat Worm Launcher Adaptable to Large-Scale IoT Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Also, researchers are developing new methods and frameworks to find out the vulnerabilities ( Cvitić et al, 2021 ). Work has been done to develop a botnet defense system to exterminate malicious botnets and make the technology usage more secure ( Pan et al, 2021 ). But on the other hand, the attackers are searching for vulnerabilities, and the never-ending game of mouse and cat continues.…”
Section: Discussionmentioning
confidence: 99%
“…Also, researchers are developing new methods and frameworks to find out the vulnerabilities ( Cvitić et al, 2021 ). Work has been done to develop a botnet defense system to exterminate malicious botnets and make the technology usage more secure ( Pan et al, 2021 ). But on the other hand, the attackers are searching for vulnerabilities, and the never-ending game of mouse and cat continues.…”
Section: Discussionmentioning
confidence: 99%
“…Distributed denial of service (DDoS) indicates that a cyber-criminal is flooding a server with an excessive number of requests to overload the system (Sahoo et al, 2019). DDoS attacks are coordinated by one machine via botnets which are a network of malware-infected devices (Pan et al, 2021). The objective of DDoS attacks is solely to disrupt a business (Anshari et al, 2022).…”
Section: Distributed Denial Of Servicementioning
confidence: 99%
“…There are also some papers proposed a machine learning-based adaptive model that can change the architecture in real-time based on detected changes to mitigate security attacks [8]. A machine learning based white-hat worm launcher adaptable to largescale IoT Network has also been built [9].…”
Section: Some Applications Of the Integration Of Iot And MLmentioning
confidence: 99%