Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
Understanding Regular Expression Denial of Service (ReDoS): Insights from LLM-Generated Regexes and Developer Forums
ICPC '24: Proceedings of the 32nd IEEE/ACM International Conference on Program ComprehensionPages 190–201https://doi.org/10.1145/3643916.3644424Regular expression Denial of Service (ReDoS) represents an algorithmic complexity attack that exploits the processing of regular expressions (regexes) to produce a denial-of-service attack. This attack occurs when a regex's evaluation time scales ...
Re(gEx|DoS)Eval: Evaluating Generated Regular Expressions and their Proneness to DoS Attacks
ICSE-NIER'24: Proceedings of the 2024 ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging ResultsPages 52–56https://doi.org/10.1145/3639476.3639757With the recent advances of code generation techniques based on Large Language Models (LLMs), developers are using them for a vast range of tasks, including regex generation. Despite the efforts to generate regexes from natural language, there is no ...
- research-articleFebruary 2024
Machine learning based smart intrusion and fault identification (SIFI) in inverter based cyber-physical microgrids
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PFhttps://doi.org/10.1016/j.eswa.2023.122291AbstractThe paper presents a machine learning based Smart Intrusion and Fault Identification (SIFI) method to identify the cyber-physical abnormalities in an inverter-based cyber-physical microgrid (CPM). The SIFI method utilizes an ensemble classifier (...
- research-articleApril 2024
Optimal energy allocation based on SINR under DoS attack
AbstractAccording to signal to interference plus noise ratio (SINR) of channel, we consider optimal attack schedule against remote state estimation in cyber–physical systems (CPSs) under denial of service (DoS) attack. Each physical process has a smart ...
- research-articleNovember 2023
DoSRT: A Denial-of-Service Resistant Trust Model for VANET
Cybernetics and Information Technologies (CYBAIT), Volume 23, Issue 4Pages 165–180https://doi.org/10.2478/cait-2023-0042AbstractThe Denial of Service (DoS) attack threatens the availability of key components of Vehicular Ad-hoc Network (VANET). Various centralized and decentralized trust-based approaches have been proposed to secure the VANET from DoS attack. The ...
-
- research-articleOctober 2023
Generating Realistic Attack Data for Microservices: Framework and Case Study
LADC '23: Proceedings of the 12th Latin-American Symposium on Dependable and Secure ComputingPages 60–69https://doi.org/10.1145/3615366.3615377Microservice applications have gained significant popularity due to their capability to decrease the complexity of developing highly scalable, manageable, and flexible systems. However, the microservices distributed nature, fine service granularity, and ...
- research-articleSeptember 2023
Event-based fixed-time synchronization of neural networks under DoS attack and its applications
Neural Networks (NENE), Volume 166, Issue CPages 622–633https://doi.org/10.1016/j.neunet.2023.07.046AbstractIn this paper, the fixed-time synchronization control for neural networks with discontinuous data communication is investigated. Due to the transmission blocking caused by DoS attack, it is intractable to establish a monotonically decreasing ...
- research-articleSeptember 2023
Optimal DoS attack strategy for cyber-physical systems: A Stackelberg game-theoretical approach
Information Sciences: an International Journal (ISCI), Volume 642, Issue Chttps://doi.org/10.1016/j.ins.2023.119134AbstractIn this paper, the optimal DoS attack on cyber-physical systems is studied in Stackelberg game framework, which is manifested by energy allocation on communication channels. To give a realistic picture of DoS attack on a normal user ...
- research-articleSeptember 2023
Distributed event-based H ∞ consensus filtering for 2-D T-S fuzzy systems over sensor networks subject to DoS attacks
Information Sciences: an International Journal (ISCI), Volume 641, Issue Chttps://doi.org/10.1016/j.ins.2023.119079AbstractThis paper concentrates on the H ∞ consensus filtering issue of a kind of nonlinear two-dimensional (2-D) systems over sensor networks, which are described by the Takagi-Sugeno fuzzy model. With consideration of the limited ...
Highlights- The H ∞ consensus filtering issue for a kind of nonlinear 2-D systems over sensor networks is concerned.
- research-articleSeptember 2023
Model-based Bayesian reinforcement learning for enhancing primary user performance under jamming attack
AbstractDue to the broadcast nature of wireless networks, jamming attacks are inevitable. Therefore, this paper considers enhancing the throughput of a primary user (PU) suffering from a random jamming attack near the receiver in a cognitive ...
- research-articleAugust 2023
Adaptive memory-based event-triggering resilient LFC for power system under DoS attack
Applied Mathematics and Computation (APMC), Volume 451, Issue Chttps://doi.org/10.1016/j.amc.2023.128041Highlights- A novel adaptive memory-event-triggering mechanism is designed under DoS attacks.
- An aperiodic sampled-data LFC system with wind power under DoS attack is reconstructed.
- A resilient adaptive memory-based event-triggering LFC scheme ...
Considering denial-of-service (DoS) attacks in the communication network, this work develops the adaptive memory-based event triggering resilient LFC approach for multi-area power systems with wind power. First of all, the impact of each DoS ...
- research-articleJuly 2023
Comparative Analysis of Stack-Ensemble-Based Intrusion Detection System for Single-Layer and Cross-layer DoS Attack Detection in IoT
AbstractDetection of Denial-of-Service (DoS) Attack in IoT is challenging as these attacks happen at multiple layers of IoT architecture. Machine learning (ML)-based Intrusion Detection Systems (IDSs) are more efficient approaches in detecting such ...
- research-articleJuly 2023
DoS attack detection in identification of FIR systems with binary‐valued observations
AbstractTimely and effective detection of malicious attacks is a primary problem in cyber‐physical system security. This paper studies the detection of DoS (denial of service) attacks in identification of FIR (finite impulse response) systems with ...
- research-articleJuly 2023
Optimal control strategy by tracking and compensation for ICPS under the DoS attack
AbstractTo solve the security problem of industrial cyber‐physical systems (ICPS) suffering from the Denial of Service (DoS) attack, this paper proposes an optimal control strategy with functions of tracking and compensation control. The system model, ...
- research-articleApril 2023
Energy scheduling for DoS attack over multi-hop networks: Deep reinforcement learning approach
Neural Networks (NENE), Volume 161, Issue CPages 735–745https://doi.org/10.1016/j.neunet.2023.02.028AbstractThis paper studies the energy scheduling for Denial-of-Service (DoS) attack against remote state estimation over multi-hop networks. A smart sensor observes a dynamic system, and transmits its local state estimate to a remote estimator. Due to ...
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 869–880https://doi.org/10.1145/3564625.3564634Linux kernel introduces the memory control group (memcg) to account and confine memory usage at the process-level. Due to its flexibility and efficiency, memcg has been widely adopted by container platforms and has become a fundamental technique. While ...
- research-articleDecember 2022
Input-to-state stability of switched linear systems with unstabilizable modes under DoS attacks
Automatica (Journal of IFAC) (AJIF), Volume 146, Issue Chttps://doi.org/10.1016/j.automatica.2022.110607AbstractIn this paper, the input-to-state stability (ISS) problem of switched linear system with unstabilizable modes is investigated under denial-of-service (DoS) attacks and external disturbance. In contrast to earlier results which consider ...
- posterOctober 2022
Development of C-plane DoS attacker for O-RAN FHI
MobiCom '22: Proceedings of the 28th Annual International Conference on Mobile Computing And NetworkingPages 850–852https://doi.org/10.1145/3495243.3558259Open radio access network (O-RAN) introduces a new architecture with new components and interfaces, which suffers from numerous security challenges and risks. The C-Plane denial-of-service (DoS) attack is considered one of the security threats for O-RAN ...
- research-articleOctober 2022
LoRaWan Sensitivity Analysis and Prevention Strategies Against Wireless DoS Attacks
Wireless Personal Communications: An International Journal (WPCO), Volume 126, Issue 4Pages 3663–3675https://doi.org/10.1007/s11277-022-09884-8AbstractNew wireless IoT technology provides smart pseudo intelligent solutions that will have a big impact on the infrastructures and the society in the future to come. In the last decade, many new low power longrange wireless technologies have emerged ...
- research-articleMay 2022
A Feature Similarity Machine Learning Model for DDoS Attack Detection in Modern Network Environments for Industry 4.0
Computers and Electrical Engineering (CENG), Volume 100, Issue Chttps://doi.org/10.1016/j.compeleceng.2022.107955Highlights- A new traffic attribute-pattern similarity function SWATHI for similarity computation between network traffic attribute patterns and evolutionary feature clustering of traffic attribute patterns to carry feature transformation-based ...
Recent advancements in artificial intelligence and machine learning technologies have laid the flagstone for the fourth industrial revolution, Industry 4.0. The industry 4.0 is at a very high momentum when compared to previous revolutions ...
Graphical AbstractDisplay Omitted