Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
暂无分享,去创建一个
[1] Chen Wang,et al. Locating Rogue Access Point Using Fine-Grained Channel Information , 2017, IEEE Transactions on Mobile Computing.
[2] M. S. Dahiya,et al. Cyber Reconnaissance: An Alarm before Cyber Attack , 2013 .
[3] Yan Zhang,et al. Attack Detection and Distributed Forensics in Machine-to-Machine Networks , 2016, IEEE Network.
[4] Eman Mousavinejad,et al. A Novel Cyber Attack Detection Method in Networked Control Systems , 2018, IEEE Transactions on Cybernetics.
[5] Zhao Yang Dong,et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.
[6] Rafal Rohozinski,et al. Stuxnet and the Future of Cyber War , 2011 .
[7] Jugal K. Kalita,et al. Towards Generating Real-life Datasets for Network Intrusion Detection , 2015, Int. J. Netw. Secur..
[8] Zainab S. Alwan,et al. Detection and Prevention of SQL Injection Attack: A Survey , 2017 .
[9] Muhannad Quwaider,et al. IoT Privacy and Security: Challenges and Solutions , 2020, Applied Sciences.
[10] Jamal Raiyn,et al. A survey of Cyber Attack Detection Strategies , 2014 .
[11] Adam N. Joinson,et al. Exploring susceptibility to phishing in the workplace , 2018, International Journal of Human-Computer Studies.
[12] Simarpreet Kaur,et al. A Detailed Survey and Classification of Commonly Recurring Cyber Attacks , 2016 .
[13] Dong Seong Kim,et al. Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things , 2019, ArXiv.
[14] Christopher J Baker. Cybersecurity for Critical Infrastructure , 2015 .
[15] V. Shanmuganathan. A Survey on Gray Hole Attack in MANET , 2012 .
[16] Luiz Eduardo Soares de Oliveira,et al. Toward a reliable anomaly-based intrusion detection in real-world environments , 2017, Comput. Networks.
[17] Byzantine Attacks and its Security Measures in Mobile Adhoc Networks , 2022 .
[18] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[19] Hal Berghel. Wireless infidelity I: war driving , 2004, CACM.
[20] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[21] Zhiguo Shi,et al. Multiple Attacks Detection in Cyber-Physical Systems Using Random Finite Set Theory , 2020, IEEE Transactions on Cybernetics.
[22] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[23] Andreas Hotho,et al. A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..
[24] Manisha Patil,et al. A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .
[25] Sukumar Mishra,et al. A Stealth Cyber-Attack Detection Strategy for DC Microgrids , 2019, IEEE Transactions on Power Electronics.
[26] Harish Kumar,et al. A Reference Dataset for Network Traffic Activity Based Intrusion Detection System , 2015, Int. J. Comput. Commun. Control.
[27] Nilanjan Dey,et al. Developing residential wireless sensor networks for ECG healthcare monitoring , 2017, IEEE Transactions on Consumer Electronics.
[28] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[29] Zhu Han,et al. Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[30] Jiankun Hu,et al. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.
[31] Dimitris Mitropoulos,et al. Fatal injection: a survey of modern code injection attack countermeasures , 2017, PeerJ Comput. Sci..
[32] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[33] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[34] Uthman A. Baroudi,et al. Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges , 2019, Neurocomputing.
[35] Nick Feamster,et al. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic , 2017, ArXiv.
[36] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[37] Nishtha Kesswani,et al. Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT , 2020 .
[38] Xinyu Yang,et al. On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.
[39] Alexander D. Kent,et al. Unified Host and Network Data Set , 2017, Security Science and Technology.
[40] Daniel E. Lucani,et al. On Goodput and Energy Measurements of Network Coding Schemes in the Raspberry Pi , 2016 .
[41] Mouad Ben Mamoun,et al. An Overview on SDN Architectures with Multiple Controllers , 2016, J. Comput. Networks Commun..
[42] Roberto Therón,et al. UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs , 2018, Comput. Secur..
[43] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .
[44] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[45] Qing-Long Han,et al. Networked control systems: a survey of trends and techniques , 2020, IEEE/CAA Journal of Automatica Sinica.
[46] Mohiuddin Ahmed,et al. Intelligent Big Data Summarization for Rare Anomaly Detection , 2019, IEEE Access.
[47] Deris Stiawan,et al. Investigating Brute Force Attack Patterns in IoT Network , 2019, J. Electr. Comput. Eng..
[48] Aiko Pras,et al. SSH Compromise Detection using NetFlow/IPFIX , 2014, CCRV.
[49] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[50] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[51] David Geer,et al. Malicious bots threaten network security , 2005, Computer.
[52] Michail Maniatakos,et al. Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.
[53] Sancheng Peng,et al. New deep learning method to detect code injection attacks on hybrid applications , 2018, J. Syst. Softw..
[54] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .
[55] Frank Beer,et al. A new Attack Composition for Network Security , 2017, DFN-Forum Kommunikationstechnologien.
[56] Onur Mutlu,et al. RowHammer: A Retrospective , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[57] Jun Ho Huh,et al. Detecting DNS-poisoning-based phishing attacks from their network performance characteristics , 2011 .
[58] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[59] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[60] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[61] Cristina Alcaraz,et al. Cyber Stealth Attacks in Critical Information Infrastructures , 2018, IEEE Systems Journal.
[62] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[63] Jiankun Hu,et al. Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling , 2017, J. Netw. Comput. Appl..
[64] Iqbal Gondal,et al. Survey of intrusion detection systems: techniques, datasets and challenges , 2019, Cybersecurity.
[65] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[66] J. Quisquater,et al. A Practical Implementation of the Timing Attack , 1998, CARDIS.
[67] Chong Li,et al. Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach , 2018, IEEE Transactions on Smart Grid.
[68] Ajay Guleria,et al. A New Labeled Flow-based DNS Dataset for Anomaly Detection: PUF Dataset , 2018 .
[69] Prakash Veeraraghavan,et al. Privacy and Security Challenges and Solutions in IOT: A review , 2019, IOP Conference Series: Earth and Environmental Science.
[70] Niccolo Cascarano,et al. GT: picking up the truth from the ground for internet traffic , 2009, CCRV.
[71] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[72] Xiaohui Liang,et al. Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.
[73] Ali A. Ghorbani,et al. Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling , 2017, Comput. Networks.
[74] Sajjan G. Shiva,et al. Comparative Analysis of ML Classifiers for Network Intrusion Detection , 2019, ICICT.
[75] M. North,et al. Ransomware: Evolution, Mitigation and Prevention , 2017 .
[76] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[77] Alexander D. Kent,et al. Cyber security data sources for dynamic network research , 2016 .
[78] Peng Liu,et al. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved , 2018, IEEE Internet of Things Journal.
[79] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[80] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[81] Julia E. Sullivan,et al. How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid , 2017 .
[82] Maruf Pasha,et al. A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures , 2017, ArXiv.