Protecting IoTs from Mirai Botnet Attacks Using Blockchains.
Zohaib AhmedSyed Muhammad DanishHassaan Khaliq QureshiMarios LestasPublished in: CAMAD (2019)
Keyphrases
- ddos attacks
- denial of service attacks
- protection mechanisms
- countermeasures
- distributed denial of service attacks
- network traffic
- security threats
- dos attacks
- peer to peer
- java card
- traffic analysis
- malicious users
- chosen plaintext
- data sets
- unauthorized access
- attack detection
- data publishing
- security protocols
- access control
- information systems