-
1
-
-
84999947276
-
-
Allen, N. Cybersecurity Weaknesses Threaten to Make Smart Cities More Costly and Dangerous Than Their Analog Predecessors. Available online: http://eprints.lse.ac.uk/65816/ (accessed on 10 May 2016).
-
-
-
-
2
-
-
84999918473
-
-
Wueest, C. The Continued Rise of DDoS Attacks. 2014. Available online: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-continued-rise-of-ddos-attacks.pdf (accessed on 10 May 2016).
-
-
-
-
3
-
-
84999904116
-
-
Jackson, W. How Hackers Can Turn the Internet of Things into a Weapon; GCN: Public Sector Media Group: Vienna, VA, USA; 2013. Available online: https://gcn.com/blogs/cybereye/2013/05/how-hackers-turninternet- of-things-into-weapon.aspx (accessed on 10 May 2016).
-
-
-
-
4
-
-
84999929531
-
-
Cox, R. 5 Notorious DDoS Attacks in 2013: Big Problem for the Internet of Things; SiliconANGLE Media Inc.: Palo Alto, CA, USA; 2013. Available online: http://siliconangle.com/blog/2013/08/26/5-notorious-ddosattacks- in-2013-big-problem-for-the-internet-of-things/ (accessed on 10 May 2016).
-
-
-
-
5
-
-
84999921495
-
-
Sharon, S. 2015 DDoS Attacks on the Rise, Attackers Shift Tactics; TechTarget Network: Newton, MA, USA; 2015. Available online: http://searchsecurity.techtarget.com/news/4500246858/2015-DDoS-attacks-on-therise- attackers-shift-tactics (accessed on 10 May 2016).
-
-
-
-
6
-
-
84999952535
-
-
Toms, L. Closed for Business–The Impact of Denial of Service Attacks in the IoT; GlobalSign GMO Internet Group: Portsmouth, NH, USA; 2016. Available online: https://www.globalsign.com/en/blog/denial-of-service-inthe- iot/ (accessed on 10 May 2016).
-
-
-
-
7
-
-
0041065277
-
The InternetWorm Program: An Analysis
-
Spafford, E.H. The InternetWorm Program: An Analysis. SIGCOMM Comput. Commun. Rev. 1989, 19, 17–57.
-
(1989)
SIGCOMM Comput. Commun. Rev
, vol.19
, pp. 17-57
-
-
Spafford, E.H.1
-
8
-
-
84999979204
-
-
Stoll, C. The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage; Doubleday: New York, NY, USA, 1989.
-
-
-
-
9
-
-
84975528034
-
Security in Internet of Things: Challenges, Solutions and Future Directions. In
-
Kumar, S.A.; Vealey, T.; Srivastava, H. Security in Internet of Things: Challenges, Solutions and Future Directions. In Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, USA, 5–8 January 2016; pp. 5772–5781.
-
(2016)
Proceedings of the 2016 49Th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, USA
, vol.58
, pp. 5772-5781
-
-
Kumar, S.A.1
Vealey, T.2
Srivastava, H.3
-
10
-
-
84962691282
-
-
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, 16–17 November 2015; ACM: New York, NY, USA
-
Yu, T.; Sekar, V.; Seshan, S.; Agarwal, Y.; Xu, C. Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, 16–17 November 2015; ACM: New York, NY, USA, 2015; pp. 5:1–5:7.
-
(2015)
Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-Of-Things
, pp. 1-5
-
-
Yu, T.1
Sekar, V.2
Seshan, S.3
Agarwal, Y.4
Xu, C.5
-
11
-
-
85001025971
-
The Internet of Things: New Interoperability, Management and Security Challenges
-
Elkhodr, M.; Shahrestani, S.; Cheung, H. The Internet of Things: New Interoperability, Management and Security Challenges. Int. J. Netw. Secur. Its Appl. 2016, 8, 85–102.
-
(2016)
Int. J. Netw. Secur. Its Appl
, vol.8
, pp. 85-102
-
-
Elkhodr, M.1
Shahrestani, S.2
Cheung, H.3
-
12
-
-
84987624024
-
-
Cvitic, I.; Vujic, M.; Husnjak, S. Classification of Security Risks in the IoT Environment. In Proceedings of the 26th DAAAM International Symposium on Intelligent Manufacturing and Automation, Zadar, Croatia, 21–24 October 2015.
-
-
-
-
13
-
-
84969211382
-
Real Time Early Warning DDoS Attack Detection
-
Academic Conferences and Publishing International Limited: Montreal, QC, Canada
-
Xylogiannopoulos, K.; Karampelas, P.; Alhajj, R. Real Time Early Warning DDoS Attack Detection. In Proceedings of the 11th International Conference on Cyber Warfare and Security, Boston, MA, USA, 17–18 March 2016; Academic Conferences and Publishing International Limited: Montreal, QC, Canada, 2016; p. 344.
-
(2016)
Proceedings of the 11Th International Conference on Cyber Warfare and Security, Boston, MA, USA, 17–18 March
, vol.2016
, pp. 344
-
-
Xylogiannopoulos, K.1
Karampelas, P.2
Alhajj, R.3
-
14
-
-
84968831131
-
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
-
Pa, Y.M.P.; Suzuki, S.; Yoshioka, K.; Matsumoto, T.; Kasama, T.; Rossow, C. IoTPOT: A Novel Honeypot for Revealing Current IoT Threats. J. Inf. Process. 2016, 24, 522–533.
-
(2016)
J. Inf. Process
, vol.24
, pp. 522-533
-
-
Pa, Y.M.P.1
Suzuki, S.2
Yoshioka, K.3
Matsumoto, T.4
Kasama, T.5
Rossow, C.6
-
15
-
-
84939134219
-
-
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, 16–19 May
-
Arış, A.; Oktuğ, S.F.; Yalçın, S.B.Ö. Internet-of-Things security: Denial of service attacks. In Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, 16–19 May 2015; pp. 903–906.
-
(2015)
Internet-Of-Things Security: Denial of Service Attacks
, pp. 903-906
-
-
Arış, A.1
Oktuğ, S.F.2
Yalçın, S.B.Ö.3
-
16
-
-
84962205612
-
-
Springer: Heidelberg, Germany
-
Pras, A.; Santanna, J.J.; Steinberger, J.; Sperotto, A. DDoS 3.0–How terrorists bring down the Internet. In Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems; Springer: Heidelberg, Germany, 2016; pp. 1–4.
-
(2016)
Ddos 3.0–How Terrorists Bring down the Internet. in Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems
, pp. 1-4
-
-
Pras, A.1
Santanna, J.J.2
Steinberger, J.3
Sperotto, A.4
-
17
-
-
84960343798
-
-
Proceedings of the International Conference on ICT for Sustainable Development: ICT4SD, Ahmedabad, India, 3–4 July 2015; Springer: Heidelberg, Germany
-
Sonar, K.; Upadhyay, H. An Approach to Secure Internet of Things Against DDoS. In Proceedings of the International Conference on ICT for Sustainable Development: ICT4SD, Ahmedabad, India, 3–4 July 2015; Springer: Heidelberg, Germany, 2016; Volume 2, pp. 367–376.
-
(2016)
An Approach to Secure Internet of Things against Ddos
, vol.2
, pp. 367-376
-
-
Sonar, K.1
Upadhyay, H.2
-
18
-
-
84937792152
-
Communication Security in Internet of Thing: Preventive Measure and Avoid DDoS Attack over IoT Network
-
Society for Computer Simulation International: San Diego, CA, USA
-
Zhang, C.; Green, R. Communication Security in Internet of Thing: Preventive Measure and Avoid DDoS Attack over IoT Network. In Proceedings of the 18th Symposium on Communications & Networking, Alexandria, VA, USA, 12–15 April 2015; Society for Computer Simulation International: San Diego, CA, USA, 2015; pp. 8–15.
-
(2015)
Proceedings of the 18Th Symposium on Communications & Networking, Alexandria, VA, USA, 12–15 April
, vol.2015
, pp. 8-15
-
-
Zhang, C.1
Green, R.2
-
19
-
-
84991821904
-
A Simulation Model for the Analysis of DDoS Amplification Attacks
-
Furfaro, A.; Malena, G.; Molina, L.; Parise, A. A Simulation Model for the Analysis of DDoS Amplification Attacks. In Proceedings of the 17th USKSIM-AMSS International Conference on Modelling and Simulation, Cambridge, UK, 25–27 March 2015; pp. 267–272.
-
(2016)
Proceedings - UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, UKSim 2015
, pp. 267-272
-
-
Furfaro, A.1
Malena, G.2
Molina, L.3
Parise, A.4
-
20
-
-
84995501226
-
-
Hu, F. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations; CRC Press: Boca Raton, FL, USA, 2016.
-
-
-
-
21
-
-
84901951363
-
-
Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 19–22 February
-
Sgouras, K.I.; Birda, A.D.; Labridis, D.P. Cyber attack impact on critical Smart Grid infrastructures. In Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 19–22 February 2014; pp. 1–5.
-
(2014)
Cyber Attack Impact on Critical Smart Grid Infrastructures
, pp. 1-5
-
-
Sgouras, K.I.1
Birda, A.D.2
Labridis, D.P.3
-
22
-
-
85010420455
-
Evaluation of Distributed Denial of Service Threat in the Internet of Things
-
IEEE: New York, NY, USA
-
Solis, P.; Pacheco, L.; Gondim, J.; Alchieri, E. Evaluation of Distributed Denial of Service Threat in the Internet of Things. In Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 31 October–2 November 2016; IEEE: New York, NY, USA, 2016.
-
(2016)
Proceedings of the 2016 IEEE 15Th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 31 October–2 November
, pp. 2016
-
-
Solis, P.1
Pacheco, L.2
Gondim, J.3
Alchieri, E.4
-
23
-
-
84960861247
-
-
Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 11–13 March
-
Nagpal, B.; Sharma, P.; Chauhan, N.; Panesar, A. DDoS tools: Classification, analysis and comparison. In Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 11–13 March 2015, pp. 342–346.
-
(2015)
Ddos Tools: Classification, Analysis and Comparison
, pp. 342-346
-
-
Nagpal, B.1
Sharma, P.2
Chauhan, N.3
Panesar, A.4
-
24
-
-
84994193625
-
The innocent perpetrators: Reflectors and reflection attacks. Adv. Comput
-
Arukonda, S.; Sinha, S. The innocent perpetrators: Reflectors and reflection attacks. Adv. Comput. Sci. 2015, 4, 94–98.
-
(2015)
Sci
, vol.4
, pp. 94-98
-
-
Arukonda, S.1
Sinha, S.2
-
25
-
-
84999954801
-
-
Bright, P. Spamhaus DDoS Grows to Internet-Threatening Size. 2013. Available online: http://arstechnica.com/security/2013/03/spamhaus-ddos-grows-to-internetthreatening-size/ (accessed on 12 May 2016).
-
-
-
-
26
-
-
84999903990
-
-
Prince, M. The DDoS That Knocked Spamhaus Offline (and HowWe Mitigated It). 2013. Available online: https://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho/ (accessed on 12 May 2016).
-
-
-
-
27
-
-
84999911634
-
-
US-CERT. Alert (TA14-017A UDP-Based Amplification Attacks). 2014. Available online: https://www.uscert.gov/ncas/alerts/TA14-017A (accessed on 12 May 2016).
-
-
-
-
28
-
-
84999908252
-
-
Goodin, D. Record-Breaking DDoS Reportedly Delivered by >145 k Hacked Cameras. 2016. Available online: http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliverinternets- biggest-ddos-ever/ (accessed on 9 October 2016).
-
-
-
-
29
-
-
84999951101
-
-
Herzog, P. Open Source Security Testing Methodology Manual (OSSTMM). Available online: https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance:March_2015.pdf (accessed on 9 August 2016).
-
-
-
-
30
-
-
84999917345
-
-
Penetration Testing Execution Standard: Penetration Testing Execution Standard. Available online: http://www.pentest-standard.org (accessed on 9 August 2016).
-
-
-
-
31
-
-
84999984789
-
-
SANS Institute. Conducting a Penetration Test on an Organization. Available online: http://resources.infosecinstitute.com/penetration-testing-methodology-web-applications/ (accessed on 9 August 2016).
-
-
-
-
32
-
-
84999986760
-
-
OWASP Testing Guide. Available online: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents (accessed on 9 August 2016).
-
-
-
-
33
-
-
84999887983
-
-
Conducting a Penetration Test on an Organization. Available online: http://www.sans.org/reading-room/whitepapers/auditing/conducting-penetration-test-organization-67 (accessed on 9 August 2016).
-
-
-
-
34
-
-
84999954855
-
-
PCI Data Security Standard (PCI DSS), Information Supplement: Penetration Testing Guidance, Version: 1.0. Available online: https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance: March_2015.pdf (accessed on 9 August 2016).
-
-
-
-
36
-
-
84999977472
-
-
Scarfone, K.A.; Souppaya, M.P.; Cody, A.; Orebaugh, A.D. SP 800-115. Technical Guide to Information Security Testing and Assessment; Technical Report; NIST: National Institute of Standards and Technology, US Department of Commerce: Gaithersburg, MD, USA, 2008.
-
-
-
-
37
-
-
84999932454
-
-
Shewhart, W.A. Statistical Method from the Viewpoint of Quality Control; Courier Corporation: North Chelmsford, MA, USA, 1939.
-
-
-
-
38
-
-
84999951397
-
-
Deming, W.E. Out of the Crisis; MIT Center for Advanced Engineering Study; MIT Press: Cambridge, MA, USA, 1986.
-
-
-
-
39
-
-
84999904603
-
-
Boyd, J.R. Patterns of Conflict; Unpublished briefing, 1986. Available online: http://www.dnipogo.org/ boyd/pdf/poc.pdf (accessed on 20 October 2015).
-
-
-
-
40
-
-
84999888083
-
-
Boyd, J.R. A Discourse on Winning and Losing; Unpublished briefing, 1996. Available online: http://dnipogo.org/john-r-boyd/ (accessed on 20 October 2015).
-
-
-
-
41
-
-
84999969193
-
-
McDowell, M. Understanding Denial-of-Service Attacks; Technical Report; US Department of Homeland Security: Washington, DC, USA, 2009.
-
-
-
-
42
-
-
84870481764
-
Hands-on Denial of Service Lab Exercises Using SlowLoris and RUDY
-
ACM: New York, NY, USA
-
Damon, E.; Dale, J.; Laron, E.; Mache, J.; Land, N.; Weiss, R. Hands-on Denial of Service Lab Exercises Using SlowLoris and RUDY. In Proceedings of the 2012 Information Security Curriculum Development Conference; Kennesaw, GA, USA, 12–13 October 2012; ACM: New York, NY, USA, 2012; pp. 21–29.
-
(2012)
Proceedings of the 2012 Information Security Curriculum Development Conference; Kennesaw, GA, USA, 12–13 October
, vol.2012
, pp. 21-29
-
-
Damon, E.1
Dale, J.2
Laron, E.3
Mache, J.4
Land, N.5
Weiss, R.6
-
43
-
-
84999913070
-
-
Kenney, M. Ping of Death. 1996. Available online: http://insecure.org/sploits/ping-o-death.html (accessed on 21 October 2014).
-
-
-
-
44
-
-
0003375670
-
An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
-
Paxson, V. An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. ACM SIGCOMM Computer Commun. Rev. 2001, 31, 38–47.
-
(2001)
ACM SIGCOMM Computer Commun. Rev
, vol.31
, pp. 38-47
-
-
Paxson, V.1
-
45
-
-
79961227245
-
IP Spoofing
-
Cisco Press: San Jose, CA USA. Available online, (accessed on 20 October 2015)
-
Ali, F. IP Spoofing. The Internet Journal, vol. 10, no. 4, Dec 2007. Cisco Press: San Jose, CA USA. Available online: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_10-4/104_ip-spoofing.html (accessed on 20 October 2015).
-
(2007)
The Internet Journal
, vol.10
, Issue.4
-
-
Ali, F.1
-
46
-
-
84999972612
-
-
Rossow, C. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Proceedings of the 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, CA, USA, 23–26 February 2014.
-
-
-
-
47
-
-
84999945222
-
-
Allweyer, T. BPMN 2.0: Introduction to the Standard for Business Process Modeling; ISBN-10: 383709331X, ISBN-13: 978-3837093315 BoD–Books on Demand; Stoughton, WI, USA, 2010.
-
-
-
-
48
-
-
84999956851
-
-
Transactional Process–Construction: Bizagi Process Modeler. Available online: http://www.bizagi.com (accessed on 20 October 2014).
-
-
-
-
49
-
-
84978091222
-
-
Internet Engineering Task Force (IETF): Fremont, CA, USA
-
Shelby, Z.; Hartke, K.; Bormann, C. The Constrained Application Protocol (CoAP); RFC 7959; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2014.
-
(2014)
The Constrained Application Protocol (Coap); RFC
, vol.7959
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
50
-
-
84999897146
-
-
UPnP Forum. UPnP Device Architecture Version 1.0, Revised on 24 April 2008. (Open Conectivity Foundation: Beaverton, OR, USA.) Available online: http://www.upnp.org/specs/arch/UPnP-arch-DeviceArchitecture-v1.0-20080424.pdf (accessed on 20 October 2015).
-
-
-
-
51
-
-
0003343295
-
-
Fremont, CA, USA
-
Case, J.; Fedor, M.; Schoffstall, M.; Davin, J. Simple Network Management Protocol (SNMP); RFC 1157 (Historic); Internet Engineering Task Force (IETF): Fremont, CA, USA, 1990.
-
Simple Network Management Protocol (SNMP); RFC 1157 (Historic); Internet Engineering Task Force (IETF)
, pp. 1990
-
-
Case, J.1
Fedor, M.2
Schoffstall, M.3
Davin, J.4
-
52
-
-
84999990839
-
-
Prolexic. Threat Advisory: SNMP Reflection DDoS Attacks. 2015. Available online: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/snmp-reflector-attacks-threat-advisory.pdf (accessed on 15 May 2015).
-
-
-
-
53
-
-
0004101509
-
-
Internet Engineering Task Force (IETF): Fremont, CA, USA
-
Blumenthal, U.; Wijnen, B. User-based Security Model (USM) for Version 3 of the Simple Network Management Protocol (SNMPv3); RFC 3414; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2002.
-
(2002)
User-Based Security Model (USM) for Version 3 of the Simple Network Management Protocol (Snmpv3); RFC
, vol.3414
-
-
Blumenthal, U.1
Wijnen, B.2
-
54
-
-
84995375888
-
-
Fremont, CA, USA
-
Case, J.; McCloghrie, K.; Rose, M.; Waldbusser, S. Introduction to Community-Based SNMPv2; RFC 1901; Internet Engineering Task Force (IETF): Fremont, CA, USA, 1996.
-
Introduction to Community-Based Snmpv2; RFC 1901; Internet Engineering Task Force (IETF)
, pp. 1996
-
-
Case, J.1
McCloghrie, K.2
Rose, M.3
Waldbusser, S.4
-
55
-
-
84999950003
-
-
Open SNMP Scanning Project. 2016. Available online: https://snmpscan.shadowserver.org (accessed on 10 January 2016).
-
-
-
-
56
-
-
84999969305
-
-
Wireshark Foundation. 2015. Available online: https://www.wireshark.org (accessed on 15 October 2015).
-
-
-
|