A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks
暂无分享,去创建一个
[1] Halenar Igor,et al. Proposal of communication standardization of industrial networks in Industry 4.0 , 2016, 2016 IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES).
[2] Vladimir Siladi,et al. Phobia treatment with the help of virtual reality , 2015, 2015 IEEE 13th International Scientific Conference on Informatics.
[3] Stephen E. Deering,et al. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.
[4] Ladislav Huraj,et al. IPv6 Network DDoS Attack with P2P Grid , 2015 .
[5] Brian Cusack,et al. Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT , 2016, InterIoT/SaSeIoT.
[6] M. Cernanský,et al. Performance Evaluations of IPTables Firewall Solutions under DDoS attacks , 2015 .
[7] Paulo S. Motta Pires,et al. Using a packet manipulation tool for security analysis of industrial network protocols , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).
[8] Ali Saman Tosun,et al. Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCam , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).
[9] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[10] Marek Simon,et al. IoT Measuring of UDP-Based Distributed Reflective DoS Attack , 2018, 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY).
[11] Darja Gabriska,et al. Motion Capture as an Extension of Web-Based Simulation , 2014 .
[12] Manasi Gyanchandani,et al. Analysis of Botnet Behavior Using Queuing Theory , 2010 .
[13] Steve Mansfield-Devine,et al. The growth and evolution of DDoS , 2015, Netw. Secur..
[14] Elisa Bertino,et al. Heimdall: Mitigating the Internet of Insecure Things , 2017, IEEE Internet of Things Journal.
[15] Davar Pishva. IoT: Their Conveniences, Security Challenges and Possible Solutions , 2017 .
[16] Iveta Dirgová Luptáková,et al. Community Cut-off Attack on Malicious Networks , 2017 .
[17] D. Bastos,et al. Internet of Things: A survey of technologies and security risks in smart home and city environments , 2018, IoT 2018.