4.5 Article

DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks

Related references

Note: Only part of the references are listed.
Review Computer Science, Information Systems

SDN/NFV architectures for edge-cloud oriented IoT: A systematic review

Partha Pratim Ray et al.

Summary: SDN and NFV have changed the way virtualized services are provided, especially when combined with IoT, but challenges related to edge-cloud communication and network services still exist. This paper provides a comprehensive review of key issues and challenges in existing architectures for SDN/NFV integration in IoT-centric edge-cloud network service provisioning, and suggests future directions to improve virtualized service scenarios. Lessons learned from comparative studies with other survey articles indicate the timely contribution of this work towards understanding SDN/NFV virtualization services in an IoT-centric edge-cloud scenario.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Information Systems

PoisonGAN: Generative Poisoning Attacks Against Federated Learning in Edge Computing Systems

Jiale Zhang et al.

Summary: Edge computing is a key technology for intelligent IoT applications, while federated learning is an intelligent edge computing framework. However, recent studies have shown that the federated learning framework is vulnerable to poisoning attacks, where the attacker's local updates can damage the functionality of the global model.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

A Survey of Moving Target Defenses for Network Security

Sailik Sengupta et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Telecommunications

Internet of Things Management Based on Software Defined Networking: A Survey

Wiem Bekri et al.

INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS (2020)

Article Computer Science, Information Systems

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense

Jin-Hee Cho et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Review Computer Science, Information Systems

Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review

Nuno Martins et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems

Ivan Farris et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Theory & Methods

A moving target defense and network forensics framework for ISP networks using SDN and NFV

Abdullah Aydeger et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks

Jiaqi Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Security Management Architecture for NFV/SDN-Aware IoT Systems

Alejandro Molina Zarca et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Detecting and Preventing Cyber Insider Threats: A Survey

Liu Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Information Systems

Deep Learning-Based Intrusion Detection with Adversaries

Zheng Wang

IEEE ACCESS (2018)

Review Computer Science, Artificial Intelligence

Intrusion detection by machine learning: A review

Chih-Fong Tsai et al.

EXPERT SYSTEMS WITH APPLICATIONS (2009)