2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, 2015
DOI: 10.1109/cit/iucc/dasc/picom.2015.256
|View full text |Cite
|
Sign up to set email alerts
|

Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures

Abstract: Abstract-Over the last decade, the level of critical infrastructure technology has been steadily transforming in order to keep pace with the growing demand for the services offered. The implementation of the smart grid, which relies on a complex and intelligent level of interconnectivity, is one example of how vital amenity provision is being refined. However, with this change, the risk of threats from the digital domain must be calculated. Superior interconnectivity between infrastructures means that the futu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
2
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
2
0
2
Order By: Relevance
“…DDoS disebut sebagai senjata pilihan hacker karena telah terbukti menjadi ancaman permanen bagi pengguna, organisasi dan infrastruktur di Internet. Di sisi lain, serangan jaringan merupakan risiko untuk integritas, kerahasiaan dan ketersediaan sumber daya yang disediakan oleh organisasi [2].…”
Section: Pendahuluanunclassified
See 1 more Smart Citation
“…DDoS disebut sebagai senjata pilihan hacker karena telah terbukti menjadi ancaman permanen bagi pengguna, organisasi dan infrastruktur di Internet. Di sisi lain, serangan jaringan merupakan risiko untuk integritas, kerahasiaan dan ketersediaan sumber daya yang disediakan oleh organisasi [2].…”
Section: Pendahuluanunclassified
“…. 2. Bagaimana performa deteksi serangan DDoS yang didasarkan pada analisis statistik terhadap log aktivitas jaringan menggunakan metode neural network sebagai fungsi deteksi berdasarkan data pelatihan dan pengujian.…”
Section: Pendahuluanunclassified
“…Abhishta et al(Abhishta et al, 2017) analyzes the impact of DDoS attack announcements on victim stock prices and finds a significant negative impact in cases where the attack creates an interruption in services. Hurst et al(Hurst et al, 2015) focuses on predicting the effects of DDoS attacks on a network of critical infrastructures and demonstrates a technique for assessing the future impact of disruptions on an integrated critical infrastructure network. Overall, the papers suggest that the consequences of a DDoS attack can be significant and wide-ranging, affecting not only the target but also other stakeholders and potentially causing financial losses.…”
Section: Introductionmentioning
confidence: 99%
“…In general, packet flow patterns from DDoS attacks behave like normal packet data flow, making it difficult for network administrators to distinguish between proper data packet flow and attack data packet flow [4]. DDoS attacks for a long time can cause the server system to lose all of its services [5,6]. Detection of the packet flow is one of the techniques to prevent DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%