Nowadays a big portion of internet traffic is generated from malicious botnets targeting various network protocols. To control such a malicious traffic, it is important to analyse attackers' techniques for exploit...
详细信息
ISBN:
(纸本)9781665476119
Nowadays a big portion of internet traffic is generated from malicious botnets targeting various network protocols. To control such a malicious traffic, it is important to analyse attackers' techniques for exploiting vulnerable systems. To this end, in this research study, we have utilized a set of open-source honeypots to analyze ongoing automated cyber-attacks on different well-known network protocols. A honeypot provides a sandbox simulated environment for malicious entities to perform their actions, recording each action for later analysis. This is achieved by exposing fake services in a public network to lure the attackers. Using the collected attack dataset, We have discussed the most common attack patterns for various protocols. Our analysis demonstrates that the majority of automated botnet attacks are targeting scanning and known vulnerabilities.
The next-generation cyber-physical systems (CPSs) with heterogeneous applications have diverse Quality-of-Service (QoS) requirements in terms of throughput, end-to-end latency, and packet drop reliability. To meet suc...
详细信息
The next-generation cyber-physical systems (CPSs) with heterogeneous applications have diverse Quality-of-Service (QoS) requirements in terms of throughput, end-to-end latency, and packet drop reliability. To meet such diverse QoS requirements, in this article, we propose a QoS-aware traffic forwarding scheme in software-defined CPS. The proposed scheme is presented as a two-stage optimization framework to minimize the associated costs in traffic forwarding. In the first stage, we aim to minimize the required number of "candidate" switches for a given network to minimize network deployment costs. In the second stage, we design a comprehensive cost function considering end-to-end delay, flow-rule utilization, and link utilization in the network. Based on the designed cost function, we formulate another optimization problem for optimal traffic forwarding (OTF). As solving OTF is NP-hard, we propose an efficient greedy-heuristic approach to solve the problem while considering application-specific QoS requirements. Further, we propose a packet-tagging method to assist the controller in mitigating rule congestion at the software-defined networking devices, and hence improve the overall networkperformance. Extensive results show that the proposed scheme minimizes the network delay and QoS-violated flows by up to 50% and 90%, respectively, compared to the state-of-the-art schemes.
Modern cellular systems must accommodate millions of mobile devices, placing significant demands on network capacity and performance. The predominant technologies for internet connectivity are Wireless Fidelity (Wi-Fi...
详细信息
In the rapidly expanding realm of the internet of Things (IoT), the escalation of sophisticated cyber threats, particularly botnet Distributed Denial of Service (DDoS) attacks, highlights the importance of Intrusion D...
详细信息
ISBN:
(纸本)9798350395730;9798350395723
In the rapidly expanding realm of the internet of Things (IoT), the escalation of sophisticated cyber threats, particularly botnet Distributed Denial of Service (DDoS) attacks, highlights the importance of Intrusion Detection systems (IDS) for maintaining network integrity. IDSs are necessary tools for identifying and mitigating such threats. Consequently, there is a compelling need for a testbed that can facilitate the development and rigorous evaluation of IDS solutions, specifically designed to meet unique requirements and constraints of IoT environments. To bridge this gap, DDOSHIELD-IoT, an IDS testbed, is introduced, aiming to provide a platform for creating and evaluating IDSs within the IoT context. DDOSHIELD-IoT leverages Docker containers and the NS-3 network simulator to accurately mimic IoT environments and traffic. DDOSHIELD-IoT is used to implement and evaluate multiple IDSs. These IDSs leverage different machine learning models, such as K-Means, to detect Mirai botnet DDoS traffic, achieving an accuracy of over 90%. This evaluation highlights DDOSHIELD-IoT's precision as an IDS testbed. Furthermore, DDOSHIELD-IoT provides the capability to measure diverse performance metrics, such as CPU and memory usage. These assessments show DDOSHIELD-IoT's contributions to IoT security practices by offering scalability and reproducibility for enhanced IDS creation and evaluation.
The effective functioning of diesel engines plays a crucial role in various industries, powering transportation, generators, and machinery. The emergence of smart maintenance strategies, combined with IOT (internet Of...
详细信息
This research focuses on the problem of evaluating the effectiveness of equipment decision-making in uncertain multi-factors where multiple factors affect the decision-making process. To address this issue, the study ...
详细信息
This research focuses on the problem of evaluating the effectiveness of equipment decision-making in uncertain multi-factors where multiple factors affect the decision-making process. To address this issue, the study proposes a method for developing a dynamic Bayesian network-based equipment decision-making model and optimizing it. The study also aims to establish a model for evaluating the effectiveness of equipment decision-making based on a dynamic Bayesian network. The study has built a assessment system that simulates the capabilities of various equipment in penetrating through enemy firewalls. The system takes into account the effects of multiple factors such as equipment performance, environment and enemy defense capabilities. The study also analyzes the errors in the effectiveness evaluation model in typical scenarios to identify areas that need improvement.
The internet of Things (IoT) is considered one of the huge parts in the wireless world and IoT devices provide individuals with a lot of ease in their daily life activities. As technology today is growing at an unexpe...
详细信息
Therefore, the internet of Vehicular Things (IoT) is a subsystem of the internet of Things (IoT). This link enables complexity and the formation of application solutions like traffic control and predictive maintenance...
详细信息
Deep learning plays a growing and crucial role on the internet of Things (IoT), especially in intelligent data analysis, decision support, and automation control. YOLOv5, as an efficient model for target detection in ...
详细信息
The Bottleneck-Bandwidth and Round-trip (BBR) congestion control algorithm was introduced by Google in 2016. Unlike prior congestion-control algorithms (CCAs), BBR does not rely on signals that are weakly correlated w...
详细信息
ISBN:
(纸本)9783031562518;9783031562525
The Bottleneck-Bandwidth and Round-trip (BBR) congestion control algorithm was introduced by Google in 2016. Unlike prior congestion-control algorithms (CCAs), BBR does not rely on signals that are weakly correlated with congestion (e.g., packet loss and transient queue delay). Instead, it characterizes a path using two parameters, bottleneck bandwidth and round-trip propagation time, and is designed to converge with a high probability to Kleinrock's optimal operating point [34]. Essentially, in stable state, BBR maximizes throughput while minimizing delay and loss. Google has used BBR for a significant fraction of its network traffic both within its datacenters and on its WAN since 2017 [15]. BBR's interaction dynamics with Cubic, the widely used CCA in the internet, has received intense scrutiny: Some studies observed BBR to be unfair to Cubic, or generally loss-based CCAs. Google, to its credit, has diligently revised BBR's design to address the criticisms. This paper focuses on characterizing the promises and potential of the third, and most recent, revision of BBR-introduced to the public in July 2023. We empirically evaluate BBRv3's performance across a range of network scenarios, e.g., considering different buffer sizes, round-trip times, packet losses, and flow-size distributions. We show that despite the improvements and optimizations introduced in BBRv3, it struggles to achieve an equitable sharing of bandwidth when competing with Cubic, the widely used CCA in the internet, in a wide range of network conditions.
暂无评论