2015 International Conference on Cyberspace (CYBER-Abuja) 2015
DOI: 10.1109/cyber-abuja.2015.7360516
|View full text |Cite
|
Sign up to set email alerts
|

Security QoS profiling against cyber terrorism in airport network systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…The mapping of the range of cyber-attacks within the civil aviation industry reveals that phishing and network attacks, such as eavesdropping, DoS, Man-in-the-middle and spoofing attacks, predominate [76]. Distributed Denial-of-Service (DDoS) and DoS attacks on network assets at the airport, most notably, Vulnerability Bandwidth Depletion DDoS Attacks (VBDDA), could be mitigated according to Ugwoke et al [77] by the proposed embedded Stateful Packet Inspection (SPI) based on the OpenFlow Application Centric Infrastructure (OACI). The focus was to mitigate attacks on Airport Information Resource Management Systems (AIRMS), an enterprise cloud-based resource management system used in some airports.…”
Section: Mitigation Of Cyber-security Challenges Within the Civil Avi...mentioning
confidence: 99%
“…The mapping of the range of cyber-attacks within the civil aviation industry reveals that phishing and network attacks, such as eavesdropping, DoS, Man-in-the-middle and spoofing attacks, predominate [76]. Distributed Denial-of-Service (DDoS) and DoS attacks on network assets at the airport, most notably, Vulnerability Bandwidth Depletion DDoS Attacks (VBDDA), could be mitigated according to Ugwoke et al [77] by the proposed embedded Stateful Packet Inspection (SPI) based on the OpenFlow Application Centric Infrastructure (OACI). The focus was to mitigate attacks on Airport Information Resource Management Systems (AIRMS), an enterprise cloud-based resource management system used in some airports.…”
Section: Mitigation Of Cyber-security Challenges Within the Civil Avi...mentioning
confidence: 99%
“…This usually results in the term referred to as black-holing [13] whereby all traffic sent to the malicious AS is simply discarded. This attack is effective in IP networks, since, once routing information is infected, it is difficult for routers to detect, and recover from the problem.…”
Section: Ddos Prefix Hijacking and Black-holingmentioning
confidence: 99%
“…This type involves three parties namely [13]: the attacker, a victim host, and a set of secondary victims (reflectors). The goal of the attacker is to use the reflectors to overwhelm the victim host with traffic.…”
Section: Ddos Reflection Attacksmentioning
confidence: 99%
See 1 more Smart Citation