Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers.
Son Duc NguyenMamoru MimuraHidema TanakaPublished in: J. Inf. Process. (2022)
Keyphrases
- management system
- stepping stones
- mobile devices
- anomaly detection
- countermeasures
- security problems
- network devices
- smart objects
- information systems
- cloud computing
- abnormal patterns
- watermarking algorithm
- malicious attacks
- computer security
- malicious users
- security threats
- security protocols
- digital images
- security mechanisms
- mobile computing
- watermarking scheme
- mobile applications
- low cost