Repository logoGCRIS
  • English
  • Türkçe
  • Русский
Log In
New user? Click here to register. Have you forgotten your password?
Home
Communities
Browse GCRIS
Entities
Overview
GCRIS Guide
  1. Home
  2. Browse by Author

Browsing by Author "Nasereddin, Mohammed"

Filter results by typing the first few letters
Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 4
    Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed
    (IEEE COMPUTER SOC, 2023) Mohammed Nasereddin; Mert Nakip; Erol Gelenbe; Nakıp, Mert; Nasereddin, Mohammed; Gelenbe, Erol; E Bulut; F Tschorsch; K Thilakarathna
    The IoT is vulnerable to network attacks and Intrusion Detection Systems (IDS) can provide high attack detection accuracy and are easily installed in IoT Servers. However IDS are seldom evaluated in operational conditions which are seriously impaired by attack overload. Thus a Local Area Network test-bed is used to evaluate the impact of UDP Flood Attacks on an IoT Server whose first line of defence is an accurate IDS. We show that attacks overload the multi-core Server and paralyze its IDS. Thus a mitigation scheme that detects attacks rapidly and drops packets within milli-seconds after the attack begins is proposed and experimentally evaluated.
  • Loading...
    Thumbnail Image
    Conference Object
    Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy
    (Institute of Electrical and Electronics Engineers Inc., 2023) Erol Gelenbe; Mohammed Nasereddin; Gelenbe, Erol; Nasereddin, Mohammed; J. Hu , G. Min , G. Wang
    Servers at Supply Chains and othet Cyber-physical systems that receive packets from IoT devices should meet the QoS needs of incoming packets and protect the system from Cyberattacks. UDP Floods are often included in attacks to overwhelm Supply Chains and the IoT through congestion that paralyzes their ability for timely Attack Detection and Mitigation. Thus this paper proposes an architecture that protects a connected Server using a Smart Quasi-Deterministic Transmission Policy Forwarder at its input. This Forwarder shapes the incoming traffic sends it to the Server without increasing the overall packet delay and avoids Server congestion. The relevant theoretical background is reviewed and measurements during a UDP Flood Attack are provided to compare the Server performance with and without the Forwarder. It is seen that during a UDP Flood Attack the Forwarder protects the Server from congestion allowing it to effectively identify Attack Packets. Congestion at the Forwarder is rapidly eliminated with "drop"commands generated by the Forwarder or sent by the Server to the Forwarder. © 2024 Elsevier B.V. All rights reserved.
Repository logo
Collections
  • Scopus Collection
  • WoS Collection
  • TrDizin Collection
  • PubMed Collection
Entities
  • Research Outputs
  • Organizations
  • Researchers
  • Projects
  • Awards
  • Equipments
  • Events
About
  • Contact
  • GCRIS
  • Research Ecosystems
  • Feedback
  • OAI-PMH

Log in to GCRIS Dashboard

GCRIS Mobile

Download GCRIS Mobile on the App StoreGet GCRIS Mobile on Google Play

Powered by Research Ecosystems

  • Privacy policy
  • End User Agreement
  • Feedback