2021
DOI: 10.1016/j.ins.2021.06.063
|View full text |Cite
|
Sign up to set email alerts
|

Novel denial-of-service attacks against cloud-based multi-robot systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…The authors managed to hijack the connection between the UAV and the remote controller. They also reversed the flight computer and control program, set the envelope, and injected it into the flight machine [38].…”
Section: Man-in-the-middle Attackmentioning
confidence: 99%
“…The authors managed to hijack the connection between the UAV and the remote controller. They also reversed the flight computer and control program, set the envelope, and injected it into the flight machine [38].…”
Section: Man-in-the-middle Attackmentioning
confidence: 99%
“…There are a lot of security challenges in cloud computing [5][6] [7] [8] . Researchers all over the world have analysed security issues and provided measure to improve it [9] [10].Cloud services faces various security issues [11].Cloud service are vulnerable to denial of service attack that may result in downtime of entire system and halt the ongoing operation [12]. There are several insider threats in cloud computing such as Any malicious user gets into system access private and sensitive data.…”
Section: A Security Challenges Of Cloud Computingmentioning
confidence: 99%
“…A quick way to temporarily resolve this issue is by turning off the ICMP request on the server. But most companies use an auto-scaling technique, which enlarges their resources according to the traffic and the downside of this process is EDOS (Economic denial of sustainability), resulting in clients paying charges for the resources they haven't used [7] Cloud computing provides the services managed by on-premises through cloud technology and they are very much vulnerable to malicious virus attacks DDoS attacks are some of the common attacks faced in the field of cloud technology [8]. DDoS attacks bring forth a huge amount of loss to the attacked company or the service.…”
Section: Figure 21 Algorithms Used In Detection Systemmentioning
confidence: 99%