Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








45 Hits in 4.9 sec

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
that are offloaded to the data plane.  ...  Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols.  ...  Additionally, schemes should mitigate against stealthy, slow DDoS attacks. XII.  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 IEEE Access  
that are offloaded to the data plane.  ...  Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols.  ...  Additionally, schemes should mitigate against stealthy, slow DDoS attacks. XII.  ... 
doi:10.1109/access.2021.3086704 fatcat:2jgbxj2cbfbp7fawkxwrztbbia

De-anonymisation attacks on Tor: A Survey

Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, Sanjay K. Jha
2021 IEEE Communications Surveys and Tutorials  
Relay cells carry endto-end data and consist of an additional relay header.  ...  The relay command can be relay data, relay begin, relay end, relay teardown, relay connected, relay extend, relay extended, relay truncate, relay truncated, or relay sendme.  ...  The attack uses a corrupt server to send unique traffic patterns, consisting of sequences of short data bursts.  ... 
doi:10.1109/comst.2021.3093615 fatcat:fjc3r2672bbz3m4rtdiweurmby

A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects [article]

Yuntao Wang, Zhou Su, Shaolong Guo, Minghui Dai, Tom H. Luan, Yiliang Liu
2023 arXiv   pre-print
Via interconnecting massive physical entities and their virtual twins with inter-twin and intra-twin communications, the Internet of digital twins (IoDT) enables free data exchange, dynamic mission cooperation  ...  , resulting in a traffic accident. • Semantic Data/Knowledge Poisoning Attack.  ...  For traffic management in vehicular ad hoc networks (VANETs), the use of digital twin can help map the traffic conditions on the real road environments into the cyber world.  ... 
arXiv:2301.13350v1 fatcat:ugccf7p3rzdyzbehsq2qkaru7u

An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities [article]

Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis
2022 arXiv   pre-print
However, no clear guideline or standard exists for modeling these data flows.  ...  This study aims to present an overview of cyber threats, attacks, and countermeasures on the primary domains of smart cities (smart government, smart mobility, smart environment, smart living, smart healthcare  ...  In this attack, connected vehicles with fake identities are optimally placed to change traffic signal timings by corrupting traffic data.  ... 
arXiv:2207.04424v1 fatcat:wx23xb3mlfhajl6ualljthqdsy

Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning

Zubair Baig, Naeem Syed, Nazeeruddin Mohammad
2022 Future Internet  
They are also known as unmanned aerial vehicles (UAVs) and are deployed to conduct area surveillance, monitor road networks for traffic, deliver goods and observe environmental phenomena.  ...  In this contribution, we propose a machine learning-based approach for detecting hijacking, GPS signal jamming and denial of service (DoS) attacks that can be carried out against a drone.  ...  Institutional Review Board Statement: Not Applicable. Informed Consent Statement: Not Applicable.  ... 
doi:10.3390/fi14070205 fatcat:wxrnfy56mjel5isqciyrwnifm4

Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip

Rajesh JS, Dean Michael Ancajas, Koushik Chakraborty, Sanghamitra Roy
2015 Proceedings of the 9th International Symposium on Networks-on-Chip - NOCS '15  
A rigorous simulation infrastructure is established to evaluate v the feasibility and potency of such an attack.  ...  At the heart of the architectural innovation is a scalable high speed data communication structure, the network-on-chip (NoC).  ...  Traffic Flow Manipulation To ensure a stealthy attack, the trojan manipulates the traffic flow at each router that a flit passes through.  ... 
doi:10.1145/2786572.2786580 dblp:conf/nocs/SACR15 fatcat:xnd254j74zdwbnfq62osgmz4cm

Game Theoretic Approaches in Vehicular Networks: A Survey [article]

Zemin Sun, Yanheng Liu, Jian Wang, Carie Anil, Dongpu Cao
2020 arXiv   pre-print
, ubiquitous access to information, and various applications.  ...  Then, a comprehensive review of applications of GT in VNs is presented, which primarily covers the aspects of QoS and security.  ...  Data alteration attack Data corruption attack [90] Assumed coalition game √ • Direct honesty: p d = D * p net • Indirect honesty:pI = I * pnet • p D : the probability that the monitored  ... 
arXiv:2006.00992v1 fatcat:lljjlitvlvbvhbg3aot5xszefm

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

Pooja Anand, Yashwant Singh, Arvind Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar
2020 IEEE Access  
However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them.  ...  A detailed taxonomy of attacks associated with various vulnerabilities is also presented in the text.  ...  The authors [205] suggested pertinent data selection or processing methods to minimize or avoid sensitive personal data within industrial applications. C.  ... 
doi:10.1109/access.2020.3022842 fatcat:ifkplk2lsjhupkt4c42fovqpta

Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review [article]

Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian
2020 arXiv   pre-print
Fog computing is an emerging computing paradigm that has come into consideration for the deployment of IoT applications amongst researchers and technology industries over the last few years.  ...  It also helps to isolate the traffic and manage prioritization to prevent attacks from network resource access controls and congested networks. Klaedtke et al.  ...  [76] proposed an authentication method which can possibly avoid MITM attack.  ... 
arXiv:2003.00395v1 fatcat:32jta5ijkzb2nfi2hzatz5pbvi

Security Data Aggregation in Wireless Sensor Networks [chapter]

Hani Alzaid, Ernest Foo, Juan Gonzalez, DongGook Park
2011 Emerging Communications for Wireless Sensor Networks  
Finally, network congestion, multi-hop routing, node processing, and data aggregation introduce delays in the network and might lead to greater latency.  ...  Recent advances in wireless sensor networks (WSNs) have led to several new promising applications including habitat monitoring and target tracking.  ...  This framework also helps to draw the road map for the future design of attack resistant secure data aggregation.  ... 
doi:10.5772/10517 fatcat:sbcgudwkqrehvk6mohfohbzgxy

Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges

Maurice J. Khabbaz, Chadi M. Assi, Wissam F. Fawaz
2012 IEEE Communications Surveys and Tutorials  
Data transmission rates become highly asymmetric and links highly error prone.  ...  , earthquakes, volcanic eruptions, floods, storms, hurricanes, severe electromagnetic interferences, congested usage, etc.) resulting in excessive delays, severe bandwidth restrictions, remarkable node  ...  The authors finally informally concluded that, in such networking scenarios, complete reliability and wise data forwarding are quite challenging tasks. dependent information (e.g. traffic congestion, availability  ... 
doi:10.1109/surv.2011.041911.00093 fatcat:isxq2w2ppjgp3bfxu7bbfwcmli

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

Abdullah Al-Noman Patwary, Ranesh Kumar Naha, Saurabh Garg, Sudheer Kumar Battula, Md Anwarul Kaium Patwary, Erfan Aghasian, Muhammad Bilal Amin, Aniket Mahanti, Mingwei Gong
2021 Electronics  
On the other hand, privacy preservation for user's data in Fog devices and application data processed in Fog devices is another concern.  ...  Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last  ...  It also helps to isolate the traffic and manage prioritization to prevent attacks from network resource access controls and congested networks.  ... 
doi:10.3390/electronics10101171 fatcat:h2q4vbw4dja4ho5tbdj4ijbnje

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
Finally, we provide designers of blockchain platforms and applications with a design methodology following the model of SRA and its hierarchy.  ...  The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer.  ...  Routing attacks are traffic route diversions, hijacking, or DoS attacks.  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi

Robust Cyber–Physical Systems: Concept, models, and implementation

Fei Hu, Yu Lu, Athanasios V. Vasilakos, Qi Hao, Rui Ma, Yogendra Patil, Ting Zhang, Jiang Lu, Xin Li, Neal N. Xiong
2016 Future generations computer systems  
; • Close-loop control attacks; • Device coordination attack; • Command misleading, etc.  ...  Here raw physical processes (RPP) data is collected, and the system is controlled by an intelligent computational world.  ...  In testing the system threshold, selected values of τ are tested against stealthy geometric attacks.  ... 
doi:10.1016/j.future.2015.06.006 fatcat:uu4jvdxq3rbh7jstt4btdku5c4
« Previous Showing results 1 — 15 out of 45 results