2019 Third International Conference on Inventive Systems and Control (ICISC) 2019
DOI: 10.1109/icisc44355.2019.9036403
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Denial of Service DoS and Distributed DoS Attack of Application and Network Layer of IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…The True Positive Rate (TPR) value is obtained from the number of DoS attack data that is successfully detected or classified as an attack as illustrated in Eq. (10). Thus, TPR has an effect on measuring the of the proposed method.…”
Section: True Positive Rate (Tpr)mentioning
confidence: 98%
See 1 more Smart Citation
“…The True Positive Rate (TPR) value is obtained from the number of DoS attack data that is successfully detected or classified as an attack as illustrated in Eq. (10). Thus, TPR has an effect on measuring the of the proposed method.…”
Section: True Positive Rate (Tpr)mentioning
confidence: 98%
“…These attacks are lethal because they can bypass traditional intrusion detection systems to produce more network traffic. They have particular characteristics and traits, such as a low average rate and use of TCP as attack traffic, which allows them to avoid detection [10]. The objectives of a DoS attack can be classified as [11]:…”
Section: Introductionmentioning
confidence: 99%
“…Denial of Service (DoS) Attacks: The Internet layer is vulnerable to DoS attacks that aim to disrupt network services by overwhelming the target with excessive traffic [60]. According to [61], DoS attacks at the TCP/IP internet layer are malicious attempts to disrupt the normal functioning of targeted servers, services, or networks by overwhelming them with a flood of internet traffic as shown in Figure 3.…”
Section: Security Issuesmentioning
confidence: 99%
“…Smart city, smart home and smart car are some of the examples of application layer automation. Some of the application layer attacks are buffer overflow attacks [20], Cross-site Scripting attack [20], SQL injection attack [21], denial of service attack [22], phishing attacks [23], and data privacy issue [24].…”
Section: Application Layer and Security Attacksmentioning
confidence: 99%
“…This link facilitates to process, pre-process, and store IoT node information based on the third party and node requirement [20]. An intruder can introduce different attacks in the Middleware in a different way such as application security attack [20], unauthorised access attack [25], replay attack [21], sleep deprivation attack [22], data security attack [26] etc. Middleware and application layer both are using resource-rich devices which can use the traditional cryptography to secure the IoT networks.…”
Section: Middleware Layer and Security Attacksmentioning
confidence: 99%