4 research outputs found
Introducing the SlowDrop Attack
In network security, Denial of Service (DoS) attacks target network systems with the aim of making them unreachable.
Last generation threats are particularly dangerous because they can be carried out with very low resource consumption by the attacker.
In this paper we propose SlowDrop, an attack characterized by a legitimate-like behavior and able to target different protocols and server systems.
The proposed attack is the first slow DoS threat targeting Microsoft IIS, until now unexploited from other similar attacks.
We properly describe the attack, analyzing its ability to target arbitrary systems on different scenarios, by including both wired and wireless connections, and comparing the proposed attack to similar threats.
The obtained results show that by executing targeted attacks, SlowDrop is successful both against conventional servers and Microsoft IIS, which is closed source and required us the execution of so called \u201cnetwork level reverse
engineering\u201d activities.
Due to its ability to successfully target different servers on different scenarios, the attack should be considered an important achievement in the slow DoS field
Data-Driven Approach based on Deep Learning and Probabilistic Models for PHY-Layer Security in AI-enabled Cognitive Radio IoT.
PhD Theses.Cognitive Radio Internet of Things (CR-IoT) has revolutionized almost every eld of life
and reshaped the technological world. Several tiny devices are seamlessly connected in
a CR-IoT network to perform various tasks in many applications. Nevertheless, CR-IoT
su ers from malicious attacks that pulverize communication and perturb network performance.
Therefore, recently it is envisaged to introduce higher-level Arti cial Intelligence
(AI) by incorporating Self-Awareness (SA) capabilities into CR-IoT objects to facilitate
CR-IoT networks to establish secure transmission against vicious attacks autonomously.
In this context, sub-band information from the Orthogonal Frequency Division Multiplexing
(OFDM) modulated transmission in the spectrum has been extracted from the
radio device receiver terminal, and a generalized state vector (GS) is formed containing
low dimension in-phase and quadrature components. Accordingly, a probabilistic method
based on learning a switching Dynamic Bayesian Network (DBN) from OFDM transmission
with no abnormalities has been proposed to statistically model signal behaviors
inside the CR-IoT spectrum. A Bayesian lter, Markov Jump Particle Filter (MJPF),
is implemented to perform state estimation and capture malicious attacks.
Subsequently, GS containing a higher number of subcarriers has been investigated. In
this connection, Variational autoencoders (VAE) is used as a deep learning technique
to extract features from high dimension radio signals into low dimension latent space
z, and DBN is learned based on GS containing latent space data. Afterward, to perform
state estimation and capture abnormalities in a spectrum, Adapted-Markov Jump
Particle Filter (A-MJPF) is deployed. The proposed method can capture anomaly that
appears due to either jammer attacks in transmission or cognitive devices in a network
experiencing di erent transmission sources that have not been observed previously. The
performance is assessed using the receiver
Performance Analysis For Wireless G (IEEE 802.11 G) And Wireless N (IEEE 802.11 N) In Outdoor Environment
This paper described an analysis the different capabilities and limitation of both IEEE technologies that has been utilized for data transmission directed to mobile device. In this work, we have compared an IEEE 802.11/g/n outdoor environment to know what technology is better. the comparison consider on coverage area (mobility), through put and measuring the interferences. The work presented here is to help the researchers to select the best technology depending of their deploying case, and investigate the best variant for outdoor. The tool used is Iperf software which is to measure the data transmission performance of IEEE 802.11n and IEEE 802.11g
Performance analysis for wireless G (IEEE 802.11G) and wireless N (IEEE 802.11N) in outdoor environment
This paper described an analysis the different
capabilities and limitation of both IEEE technologies that has been utilized for data transmission directed to mobile device. In this work, we have compared an IEEE 802.11/g/n outdoor environment to know what technology is better. The comparison consider on coverage area (mobility), throughput and measuring the interferences. The work presented here is to help the researchers to select the best technology depending of their deploying case, and investigate the best variant for outdoor. The tool used is Iperf software which is to measure the data transmission performance of IEEE 802.11n and IEEE 802.11g