2019 IEEE International Conference on Robotics, Automation, Artificial-Intelligence and Internet-of-Things (RAAICON) 2019
DOI: 10.1109/raaicon48939.2019.5
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating and Detecting DDoS attack on IoT Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…To provide security to IoT devices and SDNs, a three-tier IDPS uses user, packet, and flow validation [30]. The blockchain-based solutions also provide decentralized and transparent detection and prevention systems [31] [32]. With the aid of Internet Service Providers (ISPs), a unique solution known as "UM-BRELLA" executes security [33].…”
Section: A Conventional Solutionsmentioning
confidence: 99%
“…To provide security to IoT devices and SDNs, a three-tier IDPS uses user, packet, and flow validation [30]. The blockchain-based solutions also provide decentralized and transparent detection and prevention systems [31] [32]. With the aid of Internet Service Providers (ISPs), a unique solution known as "UM-BRELLA" executes security [33].…”
Section: A Conventional Solutionsmentioning
confidence: 99%
“…[44][45][46] Cybercrime Criminal activity either targets or uses a computer, a computer network, or a networked device. [47,48] Malware Malicious software designed to infiltrate a device without knowledge [49,50] DDoS Denial of service attack on a computer system or network that causes a service or resource tobe inaccessible to legitimate users [51][52][53][54][55] Ransomware A type of malicious program that restricts access to certain parts of files of the infected operating system and demands a ransom in exchange for removing this restriction [56][57][58][59][60] Mobile malware Its name suggests malicious software that targets explicitly the operating systems on mobile phones [61][62][63][64] Watering hole Refers to a tactic used during targeted attack campaigns where the APT is distributed through a trusted website that is usually visited by employees of the target company or entity [65,66] We contrasted this result with an international organization related to cybersecurity. We found that some of them were considered the most relevant cyberattacks in the year 2020, according to The European Union Agency for Cybersecurity (ENISA) [34].…”
Section: Type Description Referencementioning
confidence: 99%