Skip to content
2000
Volume 19, Issue 9
  • ISSN: 1872-2121
  • E-ISSN: 2212-4047

Abstract

Introduction

DDoS attacks, where numerous compromised systems overwhelm a target with traffic, are significant threats to online services' stability. These attacks exploit the fundamentals of internet communication, using botnets to flood targets and deplete their resources, severely reducing performance. The strength of DDoS attacks lies in their distributed nature, which complicates the differentiation between legitimate and malicious traffic. As digital reliance grows, so does the significance of these attacks, which impact businesses, governments, and public services crucial for operations.

Objective

The paper aims to provide a comprehensive understanding of DDoS attacks, categorizing them into bandwidth and resource depletion, infrastructure, and zero-day attacks. It seeks to highlight the complexity and impact of these attacks, particularly those utilizing IoT botnets, on internet reliability and security. The study emphasizes the limitations of current defense mechanisms, advocating for improved strategies that consider the distributed nature of these threats. Through this analysis, the paper aims to foster a deeper understanding of DDoS attacks, their consequences, and the need for more effective mitigation and prevention techniques.

Methods

The patent study employs an in-depth literature review to classify DDoS attacks and explore various mitigation strategies. It provides a detailed examination of attack mechanisms, including bandwidth depletion, resource depletion, infrastructure attacks, and zero-day vulnerabilities. The paper discusses several defense techniques, such as filtering, intrusion detection systems, and advanced AI and machine learning approaches. It emphasizes the role of IoT devices in amplifying DDoS attacks and the challenges of defending against these evolving threats.

Results and Discussion

The paper identifies four main categories of DDoS attacks and describes their operational mechanisms, impacts, and mitigation challenges. It reveals that due to inadequate security measures, IoT devices significantly contribute to the scale and impact of DDoS attacks. Despite the various defense mechanisms discussed, the paper points out their limitations in effectively countering the evolving nature of DDoS attacks. It emphasizes the need for more robust, adaptive strategies incorporating technological advancements and better security practices in IoT device manufacturing.

Conclusion

DDoS attacks, particularly those leveraging IoT botnets, pose increasingly sophisticated threats to digital infrastructure. The paper underscores the urgent need for more effective defense mechanisms, highlighting the importance of technological advancements, better IoT security, and collaborative efforts among stakeholders. It calls for future research focused on developing AI-driven systems for real-time prediction and mitigation of attacks, as well as the formulation of international cyber-security policies to address the growing menace of DDoS attacks in a globally connected environment.

Loading

Article metrics loading...

/content/journals/eng/10.2174/0118722121322166240828112546
2024-10-02
2025-11-29
Loading full text...

Full text loading...

References

  1. YorkK. Domain Name System (DNS).2017Available From: http://dyn.com/blog/dyn-statement-on-10212016-
  2. ConstantinL. DDoS Attacks Against US Banks Peaked At 60 Gbps.2012Available From: https://www.cio.com/article/2389721/ddos-attacks-against-usbanks-peaked-at-60-gbps.html
  3. VijayanJ.K. Update: Spamhaus hit by biggest-ever DDoS attacks2013Available From: https://www.computerworld.com/article/2495967/update--spamhaus-hit-by-biggest-ever-ddos-attacks.html
  4. RusselJ.O.N. HongL. Kong group battles huge DDoS attack.2014Available From: https://tinyurl.com/2jfbb9vf
  5. ThompsonC. Record-breaking DDoS attack strikes Cloud Flareś network.2014Available From: https://www.cnbc.com/2014/02/11/record-breaking-ddos-attackstrikes-cloudflares-network.html
  6. Brian KrebsKrebs on Security hit with record DDoS – Krebs on security.2016Available From: https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-withrecord-ddos/
  7. KennedyJ. OVH suffers 1.5Tbps DDoS attack via145,000 webcams.2016Available From: https://www.siliconrepublic.com/machines/mega-iot-cyberattackovh-suffers-1-5tbps-ddos-attack-via-145000-webcams
  8. GreensteinS. The aftermath of the dyn DDOS attack.IEEE Micro2019394666810.1109/MM.2019.2919886
    [Google Scholar]
  9. MenscherD. Identifying and protecting against the largest DDoS attacks.2020Available From: https://cloud.google.com/blog/products/identitysecurity/identifying-and-protecting-against-the
  10. NewmanL.H. A 1.3-Tbs DDoS hit GitHub, the largest yet recorded.2018Available From: https://www.wired.com/story/github-ddos-memcached/
  11. AmazonAWS Shield Threat Landscape Report – Q1 2020.2020Available From: https://aws-shield-tlr.s3.amazonaws.com/2020-Q1_AWS_Shield_TLR.pdf
  12. KimK. YouY. ParkM. LeeK. DDoS mitigation: Decentralized CDN using a private blockchainInternational Conference on Ubiquitous and Future Networks., 2018 Prague, Czech Republic10.1109/ICUFN.2018.8436643
    [Google Scholar]
  13. NazarioJ. DDoS attack evolution.Netw. Secur.20082008771010.1016/S1353‑4858(08)70086‑2
    [Google Scholar]
  14. ZargarS.T. JoshiJ. TipperD. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks.IEEE Commun. Surv. Tutor.20131542046206910.1109/SURV.2013.031413.00127
    [Google Scholar]
  15. NazarioJ. Politically motivated denial of service attacks.The virtual battlefield: Perspectives on cyber warfare. CzosseckC. GeersK. AmsterdamIOS Press2009163181
    [Google Scholar]
  16. WikipediaInternet activism during the 2009 Iranian election protests.2017Available From: https://en.wikipedia.org/wiki/Internet_activism_during_the_2009_Iranian_election_protests
  17. MahjabinT. A survey of distributed denial-of-service attack, prevention, and mitigation techniques.Int. J. Distrib. Sensor Netw.201720171463
    [Google Scholar]
  18. SchonfeldE. WikiLeaks reports it is under a denial of service attack.2017Available From: https://techcrunch.com/2010/11/28/WikiLeaks-DDoS-attack/
  19. SpechtS.M. LeeR.B. Distributed denial of service: Taxonomies of attacks, tools, and countermeasures.Proceedings of the ISCA 17th international conference on parallel and distributed computing systems (PDCS 2004), international workshop on security in parallel and distributed systems, 2004pp. 543-550 San Francisco, CA
    [Google Scholar]
  20. PatrickN.W. Call flooding attack.2009Available From: http://www.networkworld.com/article/2234402/cisco-subnet/callflooding-attack.html
  21. LeeR. Slowloris HTTP DoS.2009Available From: https://gist.github.com/steakknife/1865841
  22. RioReyTaxonomy of DDoS attacks.2015Available From: https://www.riorey.com/types-of-ddos-attacks#:~:text=DDoS%20attackers%20take%20advantage%20of,%2C%20CPU%2C%20etc
  23. ParkJ. IwaiK. TanakaH. Analysis of slow read DoS attack.Proceedings of the 2014 International Symposium on Information Theory and its Applications (ISITA), 2014 pp. 60-64 Melbourne, VIC, Australia
    [Google Scholar]
  24. SrivastavaA. GuptaB. TyagiA. A recent survey on DDoS attacks and defense mechanisms. Advances in parallel distributed computing. NagamalaiD. RenaultE. DhanuskodiM. Berlin, HeidelbergSpringer201157058010.1007/978‑3‑642‑24037‑9_57
    [Google Scholar]
  25. EUROCONDoS attacks and countermeasures.2017Available From: https://sites.google.com/a/pccare.vn/it/security-pages/dosattacks-and-countermeasures
  26. DengJ. MengK. XiaoY. Implementation of dos attack and mitigation strategies in IE 802.11b/g WLAN.Proceedings of SPIE defense security and sensing, 2010 Orlando, FL
    [Google Scholar]
  27. DuX. GuizaniM. XiaoY. Defending DoS attacks on broadcast authentication in wireless sensor networks.Proceedings of the IEEE International Conference on Communications, 2008, pp. 1653-1657 Beijing, China10.1109/ICC.2008.319
    [Google Scholar]
  28. PengT. LeckieC. RamamohanaraoK. Survey of network-based defense mechanisms countering the DoS and DDoS problems.ACM Comput. Surv.2007391310.1145/1216370.1216373
    [Google Scholar]
  29. Mansfield-DevineS. DDoS: Threats and mitigation.Netw. Secur.201120111251210.1016/S1353‑4858(11)70128‑3
    [Google Scholar]
  30. SrivastavaA. GuptaB. TyagiA. A recent survey on DDoS attacks and defense mechanisms. Advances in parallel distributed computing.Berlin, HeidelbergSpringer201157058010.1007/978‑3‑642‑24037‑9_57
    [Google Scholar]
  31. Graham-CummingJ. Understanding and mitigating NTP-based DDoS attacks.San Francisco, CACloudflare, Inc.2014Vol. 9
    [Google Scholar]
  32. WikipediaDistributed denial-of-service attacks on root nameservers—Wikipedia, the free encyclopedia.2017Available From: https://en.wikipedia.org/w/index.php?title=Distributed_
  33. DNSDNS products trusted by the world’s most admired digital brands.2017Available From: http://dyn.com/dns/
  34. LimerE. How hackers wrecked the internet using DVRs and webcams.2016Available From: http://www.popularmechanics.com/technology/infrastructure/a23504/mirai-botnet-internetof-things-ddos-attack/
  35. StatisticaInternet of Things (IoT): Number of connected devices worldwide from 2012 to 2020.2017Available From: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
  36. AkameiAkamais [state of the internet]/security Q4 2016 executive summary.2017Available From: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q4-2016-state-of-the-internet-security-executive-summary.pdf
  37. BakerF. Requirements for IP version 4 routers.1995Available From: https://datatracker.ietf.org/doc/rfc1812/
  38. Zhenhai Duan Xin Yuan ChandrashekarJ. Controlling IP spoofing through interdomain packet filters.IEEE Trans. Depend. Secure Comput.200851223610.1109/TDSC.2007.70224
    [Google Scholar]
  39. LiJ. MirkovicJ. WangM. SAVE source address validity enforcement protocol.Proceedings of the 21st annual joint conference of the IEEE computer and communications societies (INFOCOM 2002), 2002 New York
    [Google Scholar]
  40. JinC. WangH. ShinK.G. Hop-count filtering: An effective defense against spoofed DDoS traffic.Proceedings of the 10th ACM conference on computer and communications security, 2003pp. 30-41 Washington, DC10.1145/948109.948116
    [Google Scholar]
  41. PengT. LeckieC. RamamohanaraoK. Protection from distributed denial of service attacks using history-based IP filtering.Proceedings of the IEEE International Conference on Communications, 2003 Anchorage, AK10.1109/ICC.2003.1204223
    [Google Scholar]
  42. YaarA. PerrigA. SongD. Pi: A path identification mechanism to defend against DDoS attacks.Proceedings of the 2003 symposium on security and privacy, 2003, pp. 93-107 Berkeley, CA10.1109/SECPRI.2003.1199330
    [Google Scholar]
  43. YaarA. PerrigA. SongD. StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense.IEEE J. Sel. Areas Comm.200624101853186310.1109/JSAC.2006.877138
    [Google Scholar]
  44. BeverlyR. BergerA. HyunY. Understanding the efficacy of deployed internet source address validation filtering.Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, 2009pp. 356-369 Chicago, IL10.1145/1644893.1644936
    [Google Scholar]
  45. Yoohwan Kim ChaoH.J. ChuahM.C. PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks.IEEE Trans. Depend. Secure Comput.20063214115510.1109/TDSC.2006.25
    [Google Scholar]
  46. AdkinsD. LakshminarayananK. PerrigA. Towards a more functional and secure network infrastructure.Technical report no. UCB/CSD-03-1242BerkeleyUniversity of California2003
    [Google Scholar]
  47. KeromytisA.D. MisraV. RubensteinD. SOS: Secure overlay services.Comput. Commun. Rev.2002324617210.1145/964725.633032
    [Google Scholar]
  48. Xianjun Geng WhinstonA.B. Defeating distributed denial of service attacks.IT Prof.200024364210.1109/6294.869381
    [Google Scholar]
  49. SunB. OsborneL. XiaoY. GuizaniS. Intrusion detection techniques in mobile ad hoc and wireless sensor networks.IEEE Wirel. Commun.2007145566310.1109/MWC.2007.4396943
    [Google Scholar]
  50. PaxsonV. Bro: A system for detecting network intruders in real-time.Comput. Netw.19993123-242435246310.1016/S1389‑1286(99)00112‑7
    [Google Scholar]
  51. CabreraJ.B. LewisL. QinX. Proactive detection of distributed denial of service attacks using mib traffic variables - a feasibility study.2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001 Seattle, USA
    [Google Scholar]
  52. RoeschM. Snort: Lightweight intrusion detection for networks.Proceedings of the 13th USENIX conference on system administration, 1999pp. 229-238 Seattle, WA
    [Google Scholar]
  53. ChengC.M. KungH. TanK.S. Use of spectral analysis in defense against DoS attacks.Proceedings of the IEEE Global Telecommunications Conference, 2002 Taipei, Taiwan10.1109/GLOCOM.2002.1189011
    [Google Scholar]
  54. HussainA. HeidemannJ. PapadopoulosC. A framework for classifying denial of service attacks.Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications, 2003pp. 99-110 Karlsruhe10.1145/863955.863968
    [Google Scholar]
  55. HussainA. HeidemannJ. PapadopoulosC. Identification of repeated denial of service attacks.Proceedings of the 25th IEEE International Conference on computer communications (INFOCOM 2006), 2006pp. 1-15 Barcelona10.1109/INFOCOM.2006.126
    [Google Scholar]
  56. JowJ. XiaoY. HanW. A survey of intrusion detection systems in smart grid.Int J Sensor Netw201723317018610.1504/IJSNET.2017.083410
    [Google Scholar]
  57. NaoumiS. BazziA. BomfinR. ChafiiM. Complex Neural Network based Joint AoA and AoD Estimation for Bistatic ISAC.IEEE J. Sel. Top. Signal Process.202411510.1109/JSTSP.2024.3387299
    [Google Scholar]
  58. DelamouM. Deep Learning-based Estimation for Multitarget Radar Detection.2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), 2023 Florence, Italy10.1109/VTC2023‑Spring57618.2023.10200157
    [Google Scholar]
  59. NaoumiS. Deep Learning-Enabled Angle Estimation in Bistatic ISAC Systems.2023 IEEE Globecom Workshops., 2023pp. 854-859 Kuala Lumpur, Malaysia10.1109/GCWkshps58843.2023.10464930
    [Google Scholar]
  60. JiangD. XuZ. ZhangP. ZhuT. A transform domain-based anomaly detection approach to network-wide traffic.J. Netw. Comput. Appl.20144029230610.1016/j.jnca.2013.09.014
    [Google Scholar]
  61. MaX. ChenY. DDoS detection method based on chaos analysis of network traffic entropy.IEEE Commun. Lett.201418111411710.1109/LCOMM.2013.112613.132275
    [Google Scholar]
  62. SavageS. WetherallD. KarlinA. AndersonT. Practical network support for IP traceback.Comput. Commun. Rev.200030429530610.1145/347057.347560
    [Google Scholar]
  63. ChenR ParkJM MarchanyR Track: A novel approach for defending against distributed denial-of-service attacks.2005Available From: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=63770920aa42eedc2ae23e5e728ba61610332959
  64. DeanD. FranklinM. StubblefieldA. An algebraic approach to IP traceback.ACM Trans. Inf. Syst. Secur.20025211913710.1145/505586.505588
    [Google Scholar]
  65. SongD.X. PerrigA. Advanced and authenticated marking schemes for IP traceback.Proceedings of the 20th annual joint conference of the IEEE Computer and Communications Societies (INFOCOM 2001), 2001pp. 878-886 Anchorage, AK10.1109/INFCOM.2001.916279
    [Google Scholar]
  66. LawT.K.T. LuiJ.C.S. YauD.K.Y. You can run, but you can’t hide: An effective statistical methodology to trace back DDoS attackers.IEEE Trans. Parallel Distrib. Syst.200516979981310.1109/TPDS.2005.114
    [Google Scholar]
  67. GoodrichMT Probabilistic packet marking for large-scale IP traceback.IEEE/ACM Transac. Netw.2008161152410.1109/TNET.2007.910594
    [Google Scholar]
  68. TianH. BiJ. JiangX. A probabilistic marking scheme for fast traceback.Proceedings of the 2010 2nd International Conference on Evolving Internet (INTERNET), 2010pp. 137-141 Valencia10.1109/INTERNET.2010.32
    [Google Scholar]
  69. FadlallahA. Adaptive probabilistic packet marking scheme for IP traceback.Proceedings of the 2014 World Congress on Computer Applications and Information Systems (WCCAIS), 2014pp. 1-5 Hammamet, Tunisia10.1109/WCCAIS.2014.6916548
    [Google Scholar]
  70. YuS. Distributed denial of service attack and defense.New YorkSpringer201410.1007/978‑1‑4614‑9491‑1
    [Google Scholar]
  71. BelenkyA. AnsariN. IP traceback with deterministic packet marking.IEEE Commun. Lett.20037416216410.1109/LCOMM.2003.811200
    [Google Scholar]
  72. BelenkyA. AnsariN. Tracing multiple attackers with deterministic packet marking (DPM).Proceedings of the 2003 IEEE Pacific Rim Conference on Communications, computers, and Signal Processing, 2003pp. 49-52 Victoria, BC, Canada10.1109/PACRIM.2003.1235716
    [Google Scholar]
  73. Yang Xiang Wanlei Zhou Minyi Guo Flexible deterministic packet marking: An IP traceback. system to find the real source of attacks.IEEE Trans. Parallel Distrib. Syst.200920456758010.1109/TPDS.2008.132
    [Google Scholar]
  74. YuS. ZhouW. GuoS. A dynamical deterministic packet marking scheme for DDoS traceback.Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), 2013pp. 729-734 Atlanta, GA
    [Google Scholar]
  75. YuS. ZhouW. GuoS. GuoM. A feasible IP traceback framework through dynamic deterministic packet marking.IEEE Trans. Comput.20166551418142710.1109/TC.2015.2439287
    [Google Scholar]
  76. BellovinS.M. LeechM. TaylorT. ICMP traceback messages.2003Available From: https://academiccommons.columbia.edu/catalog/ac:127253
  77. SaurabhS. SairamA.S. ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters.Comput. Commun.201442606910.1016/j.comcom.2014.01.003
    [Google Scholar]
  78. YaoG. BiJ. VasilakosA.V. Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter.IEEE Trans. Inf. Forensics Security201510347148410.1109/TIFS.2014.2381873
    [Google Scholar]
  79. PooniaL. TinkerS. DDoS Mitigation by Software-Defined Network (SDN) in the Context of ICMP And SYP Approach.Int. J. Intell. Syst. Appl. Eng.2023121173182
    [Google Scholar]
  80. YangX. WetherallD. AndersonT. A DoS-limiting network architecture.Comput. Commun. Rev.200535424125210.1145/1090191.1080120
    [Google Scholar]
  81. LiuX. YangX. XiaY. NetFence.Comput. Commun. Rev.201040425526610.1145/1851275.1851214
    [Google Scholar]
  82. MenthM. MartinR. CharzinskiJ. Capacity overprovisioning for networks with resilience requirements.Comput. Commun. Rev.2006364879810.1145/1151659.1159925
    [Google Scholar]
  83. NailiM. AchroufeneA. NailiM. Election-based method for fault tolerance in a hierarchical sensor network (EFTOHSN): A case study of an indoor localisation system.Int J Sensor Netw201622315816510.1504/IJSNET.2016.080202
    [Google Scholar]
  84. SivasubramanianS. SzymaniakM. PierreG. SteenM. Replication for web hosting systems.ACM Comput. Surv.200436329133410.1145/1035570.1035573
    [Google Scholar]
  85. YanJ. EarlyS. AndersonR. The Xenoservice—a distributed defeat for distributed denial of service.Seman. Sch.2000
    [Google Scholar]
  86. Al-HaidariF. SqalliM.H. SalahK. Enhanced EDoS-shield for mitigating DDoS attacks originating from spoofed IP addresses.Proceedings of the 2012 IEEE 11th International Conference on Trust, security and Privacy in Computing and Communications (TrustCom), 2012 Liverpool, UK10.1109/TrustCom.2012.146
    [Google Scholar]
  87. KarnwalT. SivakumarT. AghilaG. A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack.2012 IEEE Students' Conference on Electrical, Electronics and Computer Science., 2012 Bhopal, India10.1109/SCEECS.2012.6184829
    [Google Scholar]
  88. SqalliM.H. Al-HaidariF. SalahK. EDoS-shield—a two-step mitigation technique against EDoS attacks in cloud computing.Proceedings of the 2011 4th IEEE International Conference on Utility and Cloud Computing (UCC), 2011pp. 49-56 Victoria, NSW, Australia10.1109/UCC.2011.17
    [Google Scholar]
  89. JiaQ. WangH. FleckD. Catch me if you can: A cloud-enabled DDoS defense.2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks., 2014 Atlanta, GA, USA10.1109/DSN.2014.35
    [Google Scholar]
  90. WangH. JiaQ. FleckD. PowellW. LiF. StavrouA. A moving target DDoS defense mechanism.Comput. Commun.201446102110.1016/j.comcom.2014.03.009
    [Google Scholar]
  91. BaigZ.A. BinbeshrF. Controlled Virtual Resource Access to Mitigate Economic Denial of Sustainability (EDoS) Attacks against Cloud Infrastructures.2013 International Conference on Cloud Computing and Big Data, 2013 Fuzhou, China
    [Google Scholar]
  92. SainiB. SomaniG. Index page-based EDoS attacks in infrastructure cloud.Recent Trends in Computer Networks and Distributed Systems SecurityBerlin, HeidelbergSpringerLink201410.1007/978‑3‑642‑54525‑2_34
    [Google Scholar]
  93. IdziorekJ. TannianM. JacobsonD. Detecting fraudulent use of cloud resources.Proceedings of the 3rd ACM workshop on cloud computing security workshop, 2011pp. 61-72 Chicago, IL10.1145/2046660.2046676
    [Google Scholar]
  94. IsmailM.N. AborujilahA. MusaS. Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach.Proceedings of the 7th international conference on ubiquitous information management and communication, 2013p. 36 Kota Kinabalu, Malaysia10.1145/2448556.2448592
    [Google Scholar]
  95. LatanickiJ. MassonetP. NaqviS. Scalable cloud defenses for detection, analysis and mitigation of DDoS attacks.2010Available From: http://www.future-internet.eu/
  96. YuS. TianY. GuoS. WuD.O. Can we beat DDoS attacks in clouds?IEEE Trans. Parallel Distrib. Syst.20142592245225410.1109/TPDS.2013.181
    [Google Scholar]
  97. WangB. ZhengY. LouW. HouY.T. DDoS attack protection in the era of cloud computing and Software-Defined Networking.Comput. Netw.20158130831910.1016/j.comnet.2015.02.026
    [Google Scholar]
  98. WangX. ChenM. XingC. SDSNM: A softwaredefined security networking mechanism to defend against DDoS attacks.Proceedings of the 2015 9th international conference on frontier of computer science and technology (FCST), 2015, pp. 115-121 Dalian, China10.1109/FCST.2015.27
    [Google Scholar]
  99. AloulF. Al-AliA.R. Al-DalkyR. Al-MardiniM. El-HajjW. Smart grid security: Threats, vulnerabilities, and solutions.Int. J. Smart Grid Clean Energy.2012111610.12720/sgce.1.1.1‑6
    [Google Scholar]
  100. LuZ. LuX. WangW. Review and evaluation of security threats on the communication networks in the smart grid.Proceedings of the military communications conference, 2010pp. 1830-1835 San Jose, CA, USA10.1109/MILCOM.2010.5679551
    [Google Scholar]
  101. WangW. LuZ. Cyber security in the Smart Grid: Survey and challenges.Comput. Netw.20135751344137110.1016/j.comnet.2012.12.017
    [Google Scholar]
  102. Laxmi PooniaE. DDoS Mitigation by Blockchain With Approach of Cost Model.Int. J. Recent Innov. Trends Comput. Commun.20231193873388010.17762/ijritcc.v11i9.9644
    [Google Scholar]
  103. LiuJ. XiaoY. LiS. LiangW. ChenC.L.P. Cyber security and privacy issues in smart grids.IEEE Commun. Surv. Tutor.201214498199710.1109/SURV.2011.122111.00145
    [Google Scholar]
  104. ShengY. TanK. ChenG. Detecting 802.11 MAC layer spoofing using received signal strength.Proceedings of the 27th conference on computer communications (INFOCOM 2008), 2008pp. 1768-1776 Phoenix, AZ10.1109/INFOCOM.2008.239
    [Google Scholar]
  105. XuW. TrappeW. ZhangY. The feasibility of launching and detecting jamming attacks in wireless networks.Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, 2005pp. 46-57 Urbana-Champaign, IL10.1145/1062689.1062697
    [Google Scholar]
  106. LiM. KoutsopoulosI. PoovendranR. Optimal jamming attacks and network defense policies in wireless sensor networks.Proceedings of the 26th IEEE International Conference on computer communications (INFOCOM 2007), 2007pp. 1307-1315 Barcelona10.1109/INFCOM.2007.155
    [Google Scholar]
  107. BazziA. ChafiiM. Secure Full Duplex Integrated Sensing and Communications.IEEE Trans. Inf. Forensics Security2024192082209710.1109/TIFS.2023.3346696
    [Google Scholar]
  108. NunesG. Sony Bravia—remote denial of service.2012Available From: https://www.exploit-db.com/exploits/18705/
  109. YoonS. ParkH. YooH.S. Security issues on smart home in IoT environment.Computer science and its applications. ParkJ. StojmenovicI. JeongH. Berlin, HeidelbergSpringer201569169610.1007/978‑3‑662‑45402‑2_97
    [Google Scholar]
  110. HeerT. Garcia-MorchonO. HummenR. KeohS.L. KumarS.S. WehrleK. Security challenges in the IP-based Internet of things.Wirel. Pers. Commun.201161352754210.1007/s11277‑011‑0385‑5
    [Google Scholar]
/content/journals/eng/10.2174/0118722121322166240828112546
Loading
/content/journals/eng/10.2174/0118722121322166240828112546
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test