Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
622
result(s) for
"DoS attack"
Sort by:
Slowloris DoS Attack Based Simulation
by
Ismail, Noraini
,
Hazzim, Amir
,
Sabri, Shima
in
Apache server
,
Crime
,
Denial of service attacks
2021
Denial of Service (DoS) attack is a type of cybercrime when an internet site is unavailable to be accessed by the user. The DoS attack is one of the popular attacks which can be launched by using a single machine and could take down many web servers by sending a lot of request to the server until it is disconnected. The objective of this paper is to simulate the launch and prevention against the DoS attack towards the website. The simulation of DoS attack is implemented by using ActivePerl Language and tested by using Slowloris DoS Attack. Both software shows a good combination of simulation program because it supports each other to exhaust the available connections on the servers. The result shows that the website connection is successfully unavailable to be accessed by legitimate user. In addition, the website still could not be served even clearing the cache of the browser. Finally, this paper discusses about future solution of DoS attack and recommendation for secure environment architecture.
Journal Article
Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams
2025
This work studies the hypothesis of whether the UDP DoS attack affects voice and video flows in a VoIP network. It is a continuation of a previous work that studied the same hypothesis, but the VoIP server was under different types of TCP DoS attacks. The studied VoIP platform is the Asterisk FreePBX. A simple IP network model was developed for the purpose of the study. The used platform for the modeling of IP networks is GNS3. The study is conventionally divided into two parts: in the first part, only voice streams are exchanged in the network, and the server is subjected to a UDP DoS attack, and in the second part, only video streams are exchanged in the network, and again, Asterisk is subjected to a UDP DoS attack. The obtained results confirm the results of the previous study—the performance of the Asterisk FreePBX is not affected by the UDP DoS attack. Although the server is flooded with UDP packets, it works and is not blocked, and different types of VoIP calls are realized without problems. The UDP DoS attack does not affect the parameters of voice and video VoIP streams.
Journal Article
Incorporation of Blockchain Technology for Different Smart Grid Applications: Architecture, Prospects, and Challenges
by
Goudarzi, Arman
,
Sajjad, Intisar
,
Adnan Khan, Muhammad
in
Alternative energy sources
,
Automation
,
Blockchain
2023
Smart grid integrates computer, communication, and sensing technologies into existing power grid networks to achieve significant informatization-related advantages. It will provide communication between neighbors, localized management, bidirectional power transfer, and effective demand response. Smart grids (SG) replace conventional grids by integrating various operational measures, including smart automation appliances, smart meters, and renewable energy sources. Regarding energy management and resolving energy issues, SG is one of the most cutting-edge and potentially game-changing innovations. Even still, its complexity suggests that decentralization may provide significant gains. Because of its increasing digitization and interconnectedness, it is also vulnerable to cyber threats. Blockchain, in this sense, is a potential SG paradigm solution that provides several great benefits. Even though blockchains have been widely discussed to decentralize and strengthen smart grid cybersecurity, they have not yet been researched in depth from an application and architectural standpoint. Blockchain-enabled SG applications are the subject of an in-depth research investigation. Electric vehicles (EVs), home automation, energy management systems, etc., are only a few of the many examples that have prompted the proposal of blockchain designs for their respective use cases. Information communication network security is of paramount importance. However, this evolving system raises cybersecurity issues. This paper aims to guide researchers in the right manner so they may build blockchain-based, secure, distributed SG applications in the future. This article also summarizes cybersecurity threats pertaining to smart grids. It starts with a description of a blockchain followed by the blockchain infrastructure, challenges, and solutions for different smart grid applications. A look back at the tried-and-true methods of securing a power grid is offered, and then it discusses the newer and more complex cybersecurity threats to the smart grid. In addition, models of common cyberattacks are presented, and the methods of defense against them are examined.
Journal Article
Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms
by
Altulaihan, Esra
,
Almaiah, Mohammed Amin
,
Aljughaiman, Ahmed
in
Access control
,
Algorithms
,
Automation
2024
Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT) systems are causing a wide range of problems for individuals and organizations. The IoT is self-configuring and open, making it vulnerable to insider and outsider attacks. In the IoT, devices are designed to self-configure, enabling them to connect to networks autonomously without extensive manual configuration. By using various protocols, technologies, and automated processes, self-configuring IoT devices are able to seamlessly connect to networks, discover services, and adapt their configurations without requiring manual intervention or setup. Users’ security and privacy may be compromised by attackers seeking to obtain access to their personal information, create monetary losses, and spy on them. A Denial of Service (DoS) attack is one of the most devastating attacks against IoT systems because it prevents legitimate users from accessing services. A cyberattack of this type can significantly damage IoT services and smart environment applications in an IoT network. As a result, securing IoT systems has become an increasingly significant concern. Therefore, in this study, we propose an IDS defense mechanism to improve the security of IoT networks against DoS attacks using anomaly detection and machine learning (ML). Anomaly detection is used in the proposed IDS to continuously monitor network traffic for deviations from normal profiles. For that purpose, we used four types of supervised classifier algorithms, namely, Decision Tree (DT), Random Forest (RF), K Nearest Neighbor (kNN), and Support Vector Machine (SVM). In addition, we utilized two types of feature selection algorithms, the Correlation-based Feature Selection (CFS) algorithm and the Genetic Algorithm (GA) and compared their performances. We also utilized the IoTID20 dataset, one of the most recent for detecting anomalous activity in IoT networks, to train our model. The best performances were obtained with DT and RF classifiers when they were trained with features selected by GA. However, other metrics, such as training and testing times, showed that DT was superior.
Journal Article
SlowITe, a Novel Denial of Service Attack Affecting MQTT
by
Cambiaso, Enrico
,
Vaccari, Ivan
,
Aiello, Maurizio
in
cyber-security
,
internet of things
,
mqtt
2020
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry Transport (MQTT) protocol used in IoT environments for communication between IoT devices. We exploit a specific weakness of MQTT which was identified during our research, allowing the client to configure the behavior of the server. In order to validate the possibility to exploit such vulnerability, we propose SlowITe, a novel low-rate denial of service attack aimed to target MQTT through low-rate techniques. We validate SlowITe against real MQTT services, considering both plain text and encrypted communications and comparing the effects of the threat when targeting different daemons. Results show that the attack is successful and it is able to exploit the identified vulnerability to lead a DoS on the victim with limited attack resources.
Journal Article
Real-Time DDoS Attack Detection System Using Big Data Approach
by
Yasin, Awais
,
Hakeem, Owais
,
Babar, Hafiz Muhammad Aqeel
in
Accuracy
,
Algorithms
,
Artificial intelligence
2021
Currently, the Distributed Denial of Service (DDoS) attack has become rampant, and shows up in various shapes and patterns, therefore it is not easy to detect and solve with previous solutions. Classification algorithms have been used in many studies and have aimed to detect and solve the DDoS attack. DDoS attacks are performed easily by using the weaknesses of networks and by generating requests for services for software. Real-time detection of DDoS attacks is difficult to detect and mitigate, but this solution holds significant value as these attacks can cause big issues. This paper addresses the prediction of application layer DDoS attacks in real-time with different machine learning models. We applied the two machine learning approaches Random Forest (RF) and Multi-Layer Perceptron (MLP) through the Scikit ML library and big data framework Spark ML library for the detection of Denial of Service (DoS) attacks. In addition to the detection of DoS attacks, we optimized the performance of the models by minimizing the prediction time as compared with other existing approaches using big data framework (Spark ML). We achieved a mean accuracy of 99.5% of the models both with and without big data approaches. However, in training and testing time, the big data approach outperforms the non-big data approach due to that the Spark computations in memory are in a distributed manner. The minimum average training and testing time in minutes was 14.08 and 0.04, respectively. Using a big data tool (Apache Spark), the maximum intermediate training and testing time in minutes was 34.11 and 0.46, respectively, using a non-big data approach. We also achieved these results using the big data approach. We can detect an attack in real-time in few milliseconds.
Journal Article
Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks
2023
For in-vehicle network communication, the controller area network (CAN) broadcasts to all connected nodes without address validation. Therefore, it is highly vulnerable to all sorts of attack scenarios. This research proposes a novel intrusion detection system (IDS) for CAN to identify in-vehicle network anomalies. The statistical characteristics of attacks provide valuable information about the inherent intrusion patterns and behaviors. We employed two real-world attack scenarios from publicly available datasets to record a real-time response against intrusions with increased precision for in-vehicle network environments. Our proposed IDS can exploit malicious patterns by calculating thresholds and using the statistical properties of attacks, making attack detection more efficient. The optimized threshold value is calculated using brute-force optimization for various window sizes to minimize the total error. The reference values of normality require a few legitimate data frames for effective intrusion detection. The experimental findings validate that our suggested method can efficiently detect fuzzy, merge, and denial-of-service (DoS) attacks with low false-positive rates. It is also demonstrated that the total error decreases with an increasing attack rate for varying window sizes. The results indicate that our proposed IDS minimizes the misclassification rate and is hence better suited for in-vehicle networks.
Journal Article
Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models
by
Almaraz-Rivera, Josue Genaro
,
Cantoral-Ceballos, Jose Antonio
,
Perez-Diaz, Jesus Arturo
in
Accuracy
,
class balancing
,
Classification
2022
From smart homes to industrial environments, the IoT is an ally to easing daily activities, where some of them are critical. More and more devices are connected to and through the Internet, which, given the large amount of different manufacturers, may lead to a lack of security standards. Denial of service attacks (DDoS, DoS) represent the most common and critical attack against and from these networks, and in the third quarter of 2021, there was an increase of 31% (compared to the same period of 2020) in the total number of advanced DDoS targeted attacks. This work uses the Bot-IoT dataset, addressing its class imbalance problem, to build a novel Intrusion Detection System based on Machine Learning and Deep Learning models. In order to evaluate how the records timestamps affect the predictions, we used three different feature sets for binary and multiclass classifications; this helped us avoid feature dependencies, as produced by the Argus flow data generator, whilst achieving an average accuracy >99%. Then, we conducted comprehensive experimentation, including time performance evaluation, matching and exceeding the results of the current state-of-the-art for identifying denial of service attacks, where the Decision Tree and Multi-layer Perceptron models were the best performing methods to identify DDoS and DoS attacks over IoT networks.
Journal Article
Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey
2023
Due to the openness of communication network and the complexity of system structures, multi-agent systems are vulnerable to malicious network attacks, which can cause intense instability to these systems. This article provides a survey of state-of-the-art results of network attacks on multi-agent systems. Recent advances on three types of attacks, i.e., those on DoS attacks, spoofing attacks and Byzantine attacks, the three main network attacks, are reviewed. Their attack mechanisms are introduced, and the attack model and the resilient consensus control structure are discussed, respectively, in detail, in terms of the theoretical innovation, the critical limitations and the change of the application. Moreover, some of the existing results along this line are given in a tutorial-like fashion. In the end, some challenges and open issues are indicated to guide future development directions of the resilient consensus of multi-agent system under network attacks.
Journal Article
Switching-Like Event-Triggered State Estimation for Reaction–Diffusion Neural Networks Against DoS Attacks
by
Song, Shuai
,
Wu, Nana
,
Stojanovic, Vladimir
in
Artificial Intelligence
,
Closed loops
,
Communication
2023
In this paper, event-triggered state estimation for reaction–diffusion neural networks (RDNNs) subject to Denial-of-Service (DoS) attacks is investigated. A switching-like event-triggered strategy (SETS) is proposed to handle intermittent DoS attacks, meanwhile, alleviate the burden of the network while preserving the accepted performance of the considered systems. Moreover, to obtain the unknown state, the corresponding state estimator of RDNNs is constructed. Furthermore, by virtue of a piecewise Lyapunov–Krasovskii functional method, sufficient conditions are obtained to ensure the exponential stability of the closed-loop systems. Finally, a numerical simulation is provided to demonstrate the feasibility and advantages of the obtained results.
Journal Article