Skip to main content
Erschienen in: Wireless Personal Communications 3/2023

23.09.2022

An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data

verfasst von: Soumya Ray, Kamta Nath Mishra, Sandip Dutta

Erschienen in: Wireless Personal Communications | Ausgabe 3/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays Mobile Health (also termed as m-Health) is an essential component of the healthcare sector. The m-healthcare uses different types of digitized devices (laptops, smart phones, tablets) to transfer patient runtime data very quickly among the different internetworking channels. The architecture of the m-health system is completely dependent on the centralized cloud computing system. Cloud computing architecture suffers from various attacks, which leads to the unavailability of data at runtime. The paper concentrates on the most vulnerable DDoS attack, which disrupts the network by unauthorized requests and breaks the reliability of the system. In the research paper, the authors have designed the four-layers m-healthcare architecture. An innovative DDoS recognition approach is proposed to easily identify the attacks in the system. The deterrence approaches are also analysed and experimented with the help of virtualized cloud-based software environment. The result section is progressed with the use of performance metrics, and analysis of maximum and mean value of DDoS attack success rate is also part of the research work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mousavi SM and St-Hilaire M. 2015 Early detection of DDoS attacks against SDN controllers. In: Int Conf ComputNetwCommun ICNC, pp. 77–81. Mousavi SM and St-Hilaire M. 2015 Early detection of DDoS attacks against SDN controllers. In: Int Conf ComputNetwCommun ICNC, pp. 77–81.
2.
Zurück zum Zitat Srinivas, J., Mishra, D., & Mukhopadhyay, S. (2017). A mutual authentication framework for wireless medical sensor networks. Journal of Medical Systems, 41(5), 1–19.CrossRef Srinivas, J., Mishra, D., & Mukhopadhyay, S. (2017). A mutual authentication framework for wireless medical sensor networks. Journal of Medical Systems, 41(5), 1–19.CrossRef
3.
Zurück zum Zitat SomaniG, G. M. S., Sanghi, D., Conti, M., & Rajarajan, M. (2017). Scale inside-out: Rapid mitigation of cloud DDoS attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), 959–973.CrossRef SomaniG, G. M. S., Sanghi, D., Conti, M., & Rajarajan, M. (2017). Scale inside-out: Rapid mitigation of cloud DDoS attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), 959–973.CrossRef
4.
Zurück zum Zitat Chanal, P. M., & Kakkasageri, M. S. (2020). Security and privacy in IoT: A survey. Wireless Personal Communications, 115, 1668–1693.CrossRef Chanal, P. M., & Kakkasageri, M. S. (2020). Security and privacy in IoT: A survey. Wireless Personal Communications, 115, 1668–1693.CrossRef
5.
Zurück zum Zitat Dayal, N., & Srivastava, S. (2017) Analyzing behavior of DDOS attacks to identify DDOS detection features in SDN. In 9th international conference on communication systems and networks, COMSNETS 2017, pp. 274–81. Dayal, N., & Srivastava, S. (2017) Analyzing behavior of DDOS attacks to identify DDOS detection features in SDN. In 9th international conference on communication systems and networks, COMSNETS 2017, pp. 274–81.
6.
Zurück zum Zitat Ili, Ko., Chambers, D., & Barrett, E. (2020). Adaptable feature-selecting and threshold-moving complete auto encoder for DDoS flood attack mitigation. Journal of Information Security Applicaiton, 55, 1–13. Ili, Ko., Chambers, D., & Barrett, E. (2020). Adaptable feature-selecting and threshold-moving complete auto encoder for DDoS flood attack mitigation. Journal of Information Security Applicaiton, 55, 1–13.
7.
Zurück zum Zitat Gu, Y., Li, K., Guo, Z., & Wang, Y. (2019). Semi-supervised k-means ddos detection method using hybrid feature selection algorithm. IEEE Access, 7, 64351–64365.CrossRef Gu, Y., Li, K., Guo, Z., & Wang, Y. (2019). Semi-supervised k-means ddos detection method using hybrid feature selection algorithm. IEEE Access, 7, 64351–64365.CrossRef
8.
Zurück zum Zitat Gagnon, M. P., Ngangue, P., Payne-Gagnon, J., & Desmartis, M. (2016). m-Health adoption by healthcare professionals: A systematic review. Journal of the American Medical Informatics Association, 23(1), 212–220.CrossRef Gagnon, M. P., Ngangue, P., Payne-Gagnon, J., & Desmartis, M. (2016). m-Health adoption by healthcare professionals: A systematic review. Journal of the American Medical Informatics Association, 23(1), 212–220.CrossRef
9.
Zurück zum Zitat Dovidio, J. F., & Fiske, S. T. (2012). Under the radar: How unexamined biases in decision-making processes in clinical interactions can contribute to health care disparities. American Journal of public health, 102(5), 945–952.CrossRef Dovidio, J. F., & Fiske, S. T. (2012). Under the radar: How unexamined biases in decision-making processes in clinical interactions can contribute to health care disparities. American Journal of public health, 102(5), 945–952.CrossRef
10.
Zurück zum Zitat Xu, L., & Wu, F. (2015). Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. Journal of Medical Systems, 39(2), 1–9.CrossRef Xu, L., & Wu, F. (2015). Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. Journal of Medical Systems, 39(2), 1–9.CrossRef
11.
Zurück zum Zitat Tawalbeh, L. A., MehmoodR, B. E., & Song, H. (2016). Mobile cloud computing model and big data analysis for healthcare applications. IEEE Access, 4, 6171–6180.CrossRef Tawalbeh, L. A., MehmoodR, B. E., & Song, H. (2016). Mobile cloud computing model and big data analysis for healthcare applications. IEEE Access, 4, 6171–6180.CrossRef
12.
Zurück zum Zitat Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50.CrossRef Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50.CrossRef
13.
Zurück zum Zitat Wamsley, D., & Chin-Yee, B. (2021). Covid 19, digital health technology and the politics of the unprecedented. Big Data & Society, 8(1), 1–6.CrossRef Wamsley, D., & Chin-Yee, B. (2021). Covid 19, digital health technology and the politics of the unprecedented. Big Data & Society, 8(1), 1–6.CrossRef
14.
Zurück zum Zitat Yu, Y., Guo, L., Liu, Y., Zheng, J., & Zong, Y. (2018). An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks. IEEE Access, 6, 44570–44579.CrossRef Yu, Y., Guo, L., Liu, Y., Zheng, J., & Zong, Y. (2018). An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks. IEEE Access, 6, 44570–44579.CrossRef
15.
Zurück zum Zitat Cambiaso, E., Papaleo, G., & Chiola Gand Aiello, M. (2015). Designing and modeling the slow next DoS attack. In Computational intelligence in security for information systems conference (pp. 249–259). Springer. Cambiaso, E., Papaleo, G., & Chiola Gand Aiello, M. (2015). Designing and modeling the slow next DoS attack. In Computational intelligence in security for information systems conference (pp. 249–259). Springer.
16.
Zurück zum Zitat Yu, G., Li, T., Wei, J., & Liu, C. (2017). Assessment of reduction of quality attacks on mobile IP networks. In 2017 IEEE international symposium on parallel and distributed processing with applications and 2017 IEEE international conference on ubiquitous computing and communications (ISPA/IUCC) (pp. 449-453). IEEE. Yu, G., Li, T., Wei, J., & Liu, C. (2017). Assessment of reduction of quality attacks on mobile IP networks. In 2017 IEEE international symposium on parallel and distributed processing with applications and 2017 IEEE international conference on ubiquitous computing and communications (ISPA/IUCC) (pp. 449-453). IEEE.
17.
Zurück zum Zitat Wang, X., Chen, M., & Xing, C. (2015). SDSNM: A software-defined security networking mechanism to defend against DDoS attacks. In 2015 ninth international conference on frontier of computer science and technology (pp. 115–121). IEEE. Wang, X., Chen, M., & Xing, C. (2015). SDSNM: A software-defined security networking mechanism to defend against DDoS attacks. In 2015 ninth international conference on frontier of computer science and technology (pp. 115–121). IEEE.
18.
Zurück zum Zitat Sheela, P. S., & Choudhary, M. (2017). Deploying an OpenStack cloud computing framework for university campus. In 2017 international conference on computing, communication and automation (ICCCA) (pp. 819-824). IEEE. Sheela, P. S., & Choudhary, M. (2017). Deploying an OpenStack cloud computing framework for university campus. In 2017 international conference on computing, communication and automation (ICCCA) (pp. 819-824). IEEE.
19.
Zurück zum Zitat Zekri, M., El Kafhali, S., Aboutabit, N., & Saadi, Y. (2017). DDoS attack detection using machine learning techniques in cloud computing environments. In 2017 3rd international conference of cloud computing technologies and applications (CloudTech) (pp. 1–7). IEEE. Zekri, M., El Kafhali, S., Aboutabit, N., & Saadi, Y. (2017). DDoS attack detection using machine learning techniques in cloud computing environments. In 2017 3rd international conference of cloud computing technologies and applications (CloudTech) (pp. 1–7). IEEE.
20.
Zurück zum Zitat Breitenbacher, D., & Elovici, Y. (2018). N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Computing, 17, 12–22.CrossRef Breitenbacher, D., & Elovici, Y. (2018). N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Computing, 17, 12–22.CrossRef
21.
Zurück zum Zitat Fadil, A., Riadi, I., & Aji, S. (2017). Review of detection DDOS attack detection using naive Bayes classifier for network forensics. Bulletin of Electrical Engineering and Informatics, 6, 140–148.CrossRef Fadil, A., Riadi, I., & Aji, S. (2017). Review of detection DDOS attack detection using naive Bayes classifier for network forensics. Bulletin of Electrical Engineering and Informatics, 6, 140–148.CrossRef
22.
Zurück zum Zitat Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222–233.CrossRef Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222–233.CrossRef
23.
Zurück zum Zitat Ray, S., Mishra, K. N., & Dutta, S. (2021). Susceptible data classification and security reassurance in cloud-IoT based computing environment. Sādhanā, 46, 1–25.CrossRef Ray, S., Mishra, K. N., & Dutta, S. (2021). Susceptible data classification and security reassurance in cloud-IoT based computing environment. Sādhanā, 46, 1–25.CrossRef
24.
Zurück zum Zitat ChandrakarP,. (2019). A secure remote user authentication protocol for healthcare monitoring using wireless medical sensor networks. International Journal of Ambient Computing and Intelligence (IJACI), 10(1), 96–116.CrossRef ChandrakarP,. (2019). A secure remote user authentication protocol for healthcare monitoring using wireless medical sensor networks. International Journal of Ambient Computing and Intelligence (IJACI), 10(1), 96–116.CrossRef
25.
Zurück zum Zitat Dey, N., Ashour, A. S., & Bhatt, C. (2017). Internet of things driven connected healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 3–12). Springer, Cham. Dey, N., Ashour, A. S., & Bhatt, C. (2017). Internet of things driven connected healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 3–12). Springer, Cham.
26.
Zurück zum Zitat Elhayatmy, G., Dey, N., & Ashour, A. S. (2018). Internet of Things based wireless body area network in healthcare. In Internet of things and big data analytics toward next-generation intelligence (pp. 3–20). Springer, Cham. Elhayatmy, G., Dey, N., & Ashour, A. S. (2018). Internet of Things based wireless body area network in healthcare. In Internet of things and big data analytics toward next-generation intelligence (pp. 3–20). Springer, Cham.
27.
Zurück zum Zitat Dey, N., Ashour Amrita, S., & Shi, F. (2017). Developing residential wireless sensor networks for EGG healthcare monitoring. IEEE Transactions on Consumer Electronics, 63(4), 442–449.CrossRef Dey, N., Ashour Amrita, S., & Shi, F. (2017). Developing residential wireless sensor networks for EGG healthcare monitoring. IEEE Transactions on Consumer Electronics, 63(4), 442–449.CrossRef
28.
Zurück zum Zitat Dey, N., Ashour, A. S., Shi, F., Fong, S. J., & Tavares Joao Manuel, R. S. (2018). Medical cyber-physical systems: A survey. Journal of Medical Systems, 42(4), 1–13.CrossRef Dey, N., Ashour, A. S., Shi, F., Fong, S. J., & Tavares Joao Manuel, R. S. (2018). Medical cyber-physical systems: A survey. Journal of Medical Systems, 42(4), 1–13.CrossRef
29.
Zurück zum Zitat Kamble, P., & Gawade, A. (2019). Digitalization of healthcare with IoT and cryptographic encryption against DOS attacks. In 2019 international conference on contemporary computing and informatics (IC3I) (pp. 69–73). IEEE. Kamble, P., & Gawade, A. (2019). Digitalization of healthcare with IoT and cryptographic encryption against DOS attacks. In 2019 international conference on contemporary computing and informatics (IC3I) (pp. 69–73). IEEE.
30.
Zurück zum Zitat Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.CrossRef Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.CrossRef
31.
Zurück zum Zitat Zhang, J., & Xue Nand Huang, X. (2016). A secure systems for pervasive social network-based healthcare. In IEEE Access, 4, 9239–9250.CrossRef Zhang, J., & Xue Nand Huang, X. (2016). A secure systems for pervasive social network-based healthcare. In IEEE Access, 4, 9239–9250.CrossRef
32.
Zurück zum Zitat Rodrigues, B., Bocek, T., & Stiller, B. (2017). Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS). In 43rd IEEE conference on local computer networks (LCN2018), demonstration track, Singapore, Singapore pp. 1–3. Rodrigues, B., Bocek, T., & Stiller, B. (2017). Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS). In 43rd IEEE conference on local computer networks (LCN2018), demonstration track, Singapore, Singapore pp. 1–3.
33.
Zurück zum Zitat Giri, N., Jaisinghani, R., Kriplani, R., Ramrakhyani, T., & Bhatia, V. (2019). Distributed denial of service (DDoS) mitigation in software defined network using blockchain. In 2019 third international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC) (pp. 673–678). IEEE. Giri, N., Jaisinghani, R., Kriplani, R., Ramrakhyani, T., & Bhatia, V. (2019). Distributed denial of service (DDoS) mitigation in software defined network using blockchain. In 2019 third international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC) (pp. 673–678). IEEE.
34.
Zurück zum Zitat Al-Sakran, H., Alharbi, Y., & Serguievskaia, I. (2019). Framework architecture for securing IoT using blockchain, smart contract and software defined network technologies. In 2019 2nd international conference on new trends in computing sciences (ICTCS) (pp. 1–6). IEEE. Al-Sakran, H., Alharbi, Y., & Serguievskaia, I. (2019). Framework architecture for securing IoT using blockchain, smart contract and software defined network technologies. In 2019 2nd international conference on new trends in computing sciences (ICTCS) (pp. 1–6). IEEE.
35.
Zurück zum Zitat Alkadi, O., Moustafa, N., & Turnbull, B. (2020). A review of intrusion detection and blockchain applications in the cloud: Approaches, challenges, and solutions. IEEE Access, 8, 104893–104917.CrossRef Alkadi, O., Moustafa, N., & Turnbull, B. (2020). A review of intrusion detection and blockchain applications in the cloud: Approaches, challenges, and solutions. IEEE Access, 8, 104893–104917.CrossRef
36.
Zurück zum Zitat Hanen, J., Kechaou, Z., & Ayed, M. B. (2016). An enhanced healthcare system in mobile cloud computing environment. Vietnam Journal of Computer Science, 3, 267–277.CrossRef Hanen, J., Kechaou, Z., & Ayed, M. B. (2016). An enhanced healthcare system in mobile cloud computing environment. Vietnam Journal of Computer Science, 3, 267–277.CrossRef
37.
Zurück zum Zitat Nkosi, M. T., & Mekuria, F. (2010). Cloud computing for enhanced mobile health applications. In 2010 IEEE second international Conference on cloud computing technology and science (pp. 629–633). IEEE. Nkosi, M. T., & Mekuria, F. (2010). Cloud computing for enhanced mobile health applications. In 2010 IEEE second international Conference on cloud computing technology and science (pp. 629–633). IEEE.
38.
Zurück zum Zitat Ray, S., Mishra, K. N., & Dutta, S. (2022). Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach. International Journal of Information Technology, 14(3), 1333–1341.CrossRef Ray, S., Mishra, K. N., & Dutta, S. (2022). Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach. International Journal of Information Technology, 14(3), 1333–1341.CrossRef
39.
Zurück zum Zitat Ahmed, H. I., Nasr, A. A., Abdel-Mageid, S. M., & Aslan, H. K. (2021). DADEM: distributed attack detection model based on big data analytics for the enhancement of the security of internet of things (IoT). International Journal of Ambient Computing and Intelligence (IJACI), 12(1), 114–139.CrossRef Ahmed, H. I., Nasr, A. A., Abdel-Mageid, S. M., & Aslan, H. K. (2021). DADEM: distributed attack detection model based on big data analytics for the enhancement of the security of internet of things (IoT). International Journal of Ambient Computing and Intelligence (IJACI), 12(1), 114–139.CrossRef
40.
Zurück zum Zitat Rath, M., Swain, J., Pati, B., & Pattanayak, B. K. (2018). Network security: attacks and control in MANET. In Handbook of research on network forensics and analysis techniques (pp. 19–37). IGI Global. Rath, M., Swain, J., Pati, B., & Pattanayak, B. K. (2018). Network security: attacks and control in MANET. In Handbook of research on network forensics and analysis techniques (pp. 19–37). IGI Global.
41.
Zurück zum Zitat Abdullah, E. G., Yildiz, K., & Buldu, A. (2021). Detection of DDoS attacks with feed forward based deep neural network model. Expert Systems with Applications, 169, 1–8. Abdullah, E. G., Yildiz, K., & Buldu, A. (2021). Detection of DDoS attacks with feed forward based deep neural network model. Expert Systems with Applications, 169, 1–8.
42.
Zurück zum Zitat Albuquerque Silas, L., & Gondim Paulo, R. L. (2016). Security in cloud-computing-based mobile health. It Professional, 18(3), 37–44.CrossRef Albuquerque Silas, L., & Gondim Paulo, R. L. (2016). Security in cloud-computing-based mobile health. It Professional, 18(3), 37–44.CrossRef
43.
Zurück zum Zitat Sun, J., Zhu, X., Zhang, C., & Fang, Y. (2011). Security and privacy for Mobile healthcare (m-health) systems. Handbook on securing cyber-physical infrastructure. Sun, J., Zhu, X., Zhang, C., & Fang, Y. (2011). Security and privacy for Mobile healthcare (m-health) systems. Handbook on securing cyber-physical infrastructure.
44.
Zurück zum Zitat Wang, Y., Hu, T., Tang, G., Xie, J., & Lu, J. (2019). SGS: Safe–guard scheme for protecting control plane against DDoS attacks in software–defined networking. IEEE Access, 7, 34699–34710.CrossRef Wang, Y., Hu, T., Tang, G., Xie, J., & Lu, J. (2019). SGS: Safe–guard scheme for protecting control plane against DDoS attacks in software–defined networking. IEEE Access, 7, 34699–34710.CrossRef
45.
Zurück zum Zitat Feng, W., Zhang, Q., Hu, G., & Huang, J. X. (2014). Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems, 37, 127–140.CrossRef Feng, W., Zhang, Q., Hu, G., & Huang, J. X. (2014). Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems, 37, 127–140.CrossRef
46.
Zurück zum Zitat Dong, S., Abbas, K., & Jain, R. (2019). A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access, 7, 80813–80828.CrossRef Dong, S., Abbas, K., & Jain, R. (2019). A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access, 7, 80813–80828.CrossRef
47.
Zurück zum Zitat Wang, D., & Jie, J. (2010). A multi-core based DDoS detection method. In 2010 3rd international conference on computer science and information technology (Vol. 4, pp. 115–118). IEEE. Wang, D., & Jie, J. (2010). A multi-core based DDoS detection method. In 2010 3rd international conference on computer science and information technology (Vol. 4, pp. 115–118). IEEE.
48.
Zurück zum Zitat Milne, R., & Costa, A. (2020). Disruption and dislocation in Post-COVID futures for digital health. Big Data and Society, 7(2), 1–7.CrossRef Milne, R., & Costa, A. (2020). Disruption and dislocation in Post-COVID futures for digital health. Big Data and Society, 7(2), 1–7.CrossRef
50.
Zurück zum Zitat Alazab, M. (2015). Profling and classifying the behavior of malicious codes. The Journal of Systems and Software, 100, 91–102.CrossRef Alazab, M. (2015). Profling and classifying the behavior of malicious codes. The Journal of Systems and Software, 100, 91–102.CrossRef
51.
Zurück zum Zitat Yang, J. G., Wang, X. T., & Liu, L. Q. (2016). Based on traffic and IP entropy characteristics of DDoS attack detection method. Application Research of Computers, 33(4), 1145–1149. Yang, J. G., Wang, X. T., & Liu, L. Q. (2016). Based on traffic and IP entropy characteristics of DDoS attack detection method. Application Research of Computers, 33(4), 1145–1149.
52.
Zurück zum Zitat Nguyen, H. T., Ngo, Q. D., & Le, V. H. (2020). A novel graph-based approach for IoT botnet detection. International Journal of Information Security, 19(5), 567–577.CrossRef Nguyen, H. T., Ngo, Q. D., & Le, V. H. (2020). A novel graph-based approach for IoT botnet detection. International Journal of Information Security, 19(5), 567–577.CrossRef
Metadaten
Titel
An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data
verfasst von
Soumya Ray
Kamta Nath Mishra
Sandip Dutta
Publikationsdatum
23.09.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-10018-3

Weitere Artikel der Ausgabe 3/2023

Wireless Personal Communications 3/2023 Zur Ausgabe

Neuer Inhalt