4.6 Article

A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Software-Defined Networking Meets Software-Defined Radio in Mobile ad hoc Networks: State of the Art and Future Directions

Dimitrios Kafetzis et al.

Summary: This survey article aims to discuss the application of cross-layer optimization, Software-Defined Networking (SDN), and Software-Defined Radio (SDR) in wireless network design and emphasize their interaction for the optimization of mobile ad hoc networks (MANETs). Current SDN approaches focus on network-level routing and traffic flow optimization, while SDR is restricted to the PHY and MAC layers. By extending SDN to the PHY and MAC layers and combining it with the flexibility and fast adaptation of SDR, real cross-layer optimization can be achieved.

IEEE ACCESS (2022)

Review Green & Sustainable Science & Technology

A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing

Salil Bharany et al.

Summary: This paper explores the impact of high energy consumption in cloud data centers on the environment and suggests energy-saving solutions. The study indicates that software level techniques are more feasible than hardware level techniques for reducing energy consumption and CO2 emissions.

SUSTAINABILITY (2022)

Article Chemistry, Analytical

Efficient Middleware for the Portability of PaaS Services Consuming Applications among Heterogeneous Clouds

Salil Bharany et al.

Summary: This paper proposes a middleware platform to address the issue of application portability among clouds, and experimental results validate its effectiveness.

SENSORS (2022)

Article Green & Sustainable Science & Technology

A Novel Optimization for GPU Mining Using Overclocking and Undervolting

Mohammed Shuaib et al.

Summary: Cryptography and blockchain technology have existed for a long time and are advancing rapidly. Bitcoin, as a cryptocurrency based on blockchain, has sparked a digital revolution. The interest in cryptocurrency mining has grown among governments, enterprises, and individuals looking for a competitive edge or additional income.

SUSTAINABILITY (2022)

Article Green & Sustainable Science & Technology

Energy Efficient Clustering Protocol for FANETS Using Moth Flame Optimization

Salil Bharany et al.

Summary: FANET is a hot research topic, facing challenges such as short flight times and inefficient routing. By employing moth flame optimization algorithm and AI-based clustering methods, routing efficiency can be improved and energy consumption can be reduced.

SUSTAINABILITY (2022)

Article Computer Science, Information Systems

Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities

Edeh Michael Onyema et al.

Summary: This paper proposes an ensemble intrusion strategy based on Cyborg Intelligence framework to enhance the security of IoT enabled networks. By utilizing multiple algorithms, the paper successfully identifies threats and attacks-botnets in IoT networks and achieves good accuracy and detection rate.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2022)

Article Green & Sustainable Science & Technology

Energy efficient fault tolerance techniques in green cloud computing: A systematic survey and taxonomy

Salil Bharany et al.

Summary: This paper presents the research progress and challenges of fault tolerance techniques in cloud computing, and analyzes the relationship between energy consumption and fault tolerance potential. The paper categorizes errors, faults, and failures in cloud computing systems, and discusses the application of advanced technologies such as artificial intelligence, deep learning, the Internet of Things, and machine learning in intelligent fault tolerance strategies for the cloud environment.

SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS (2022)

Article

A generic and smart automation system for home using internet of things

Perumal Iyappan et al.

Bulletin of Electrical Engineering and Informatics (2022)

Article Remote Sensing

Wildfire Monitoring Based on Energy Efficient Clustering Approach for FANETS

Salil Bharany et al.

Summary: This paper presents a unique clustering approach for forest fire detection, which transfers data to a base station via wireless communication to extend the lifetime of unmanned aerial vehicles. The proposed EE-SS algorithm, which regulates the energy usage of nodes, outperforms other state-of-art algorithms in terms of overall energy usage, network lifetime, and cluster building time.

DRONES (2022)

Review Computer Science, Information Systems

SDN Security Review: Threat Taxonomy, Implications, and Open Challenges

Mohamed Rahouti et al.

Summary: Software-Defined Networking (SDN) is a networking paradigm that enables dynamic and flexible configuration of networks by separating the control plane and data plane. SDN provides solutions for managing high-demand resources, unpredictable data traffic patterns, and network security. However, it also faces traditional security threats and introduces new vulnerabilities. This paper conducts a comprehensive survey on SDN's core functionality and proposes measures to address the challenges in securing SDN-based communications, along with categorizing threat solutions at different layers. Security implications and future research trends are highlighted.

IEEE ACCESS (2022)

Article Energy & Fuels

Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol

Salil Bharany et al.

Summary: This study proposes an energy-efficient clustering algorithm for Flying Ad-hoc networks and improves the LEACH protocol to reduce energy consumption in data transmission, thereby extending network lifetime and maximizing node's residual energy. Experimental results on MATLAB show that the proposed algorithm outperforms existing LEACH and Centralized Low-Energy Adaptive Clustering Hierarchy Protocol in terms of energy efficiency and packet delivery ratio while also improving First Node Death compared to LEACH and LEACH-C protocols.

ENERGIES (2021)

Article Computer Science, Artificial Intelligence

Exploiting dimensionality reduction and neural network techniques for the development of expert brain-computer interfaces

Muhammad Tariq Sadiq et al.

Summary: This study employed a two-step filtering approach and four data reduction techniques to explore the dynamic nature of MI EEG signals, providing a new avenue for decoding different brain signals. Experimental results indicated that NCA performed well in subject dependent cases with accuracy reaching 100%, and also showed high precision in subject independent cases.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Computer Science, Theory & Methods

Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel

Jingyu Hua et al.

Summary: In this article, we propose the first True Worm-Hole Attack in Software-Defined Networking, which introduces a relay host to establish an in-band covert channel between cheating switches, achieving packet transmission over the forged link without using any out-of-band channels. Attackers only need remote read and write privileges of flow tables, without altering software or hardware. Extensive experiments demonstrate the high feasibility and manageable impact of this attack.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Hardware & Architecture

SDN Candidate Selection in Hybrid IP/SDN Networks for Single Link Failure Protection

Ze Yang et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2020)

Article Computer Science, Information Systems

Counteracting Attacks From Malicious End Hosts in Software Defined Networks

Vijay Varadharajan et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Article Computer Science, Information Systems

Attack Graph-Based Moving Target Defense in Software-Defined Networks

Seunghyun Yoon et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Article Computer Science, Information Systems

A Middleware for Polyglot Persistence and Data Portability of Big Data PaaS Cloud Applications

Kiranbir Kaur et al.

CMC-COMPUTERS MATERIALS & CONTINUA (2020)

Article Computer Science, Information Systems

Thwarting ICMP Low-Rate Attacks Against Firewalls While Minimizing Legitimate Traffic Loss

Kadhim Hayawi et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

A Policy-Based Security Architecture for Software-Defined Networks

Vijay Varadharajan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Review Chemistry, Analytical

Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption

Ruqayah R. Al-Dahhan et al.

SENSORS (2019)

Article Telecommunications

Using INSPECTOR Device to Stop Packet Injection Attack in SDN

Abdullah Soliman Alshra'a et al.

IEEE COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

Enhancing Security Management at Software-Defined Exchange Points

Himal Kumar et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

DDOS Attack Detection & Prevention in SDN using OpenFlow Statistics

Nisha Ahuja et al.

PROCEEDINGS OF THE 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC 2019) (2019)

Article Computer Science, Theory & Methods

Packet Injection Attack and Its Defense in Software-Defined Networks

Shuhua Deng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

Software-Defined Optical Networks and Network Abstraction With Functional Service Design

Xiaoyuan Cao et al.

JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Packet_In message based DDoS attack detection in SDN network using OpenFlow

Xiang You et al.

2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) (2017)

Review Computer Science, Theory & Methods

Interoperability and Portability Approaches in Inter-Connected Clouds: A Review

Kiranbir Kaur et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Information Systems

Software Defined Optical Networks (SDONs): A Comprehensive Survey

Akhilesh S. Thyagaturu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Engineering, Electrical & Electronic

Software Defined Mobile Networks: Concept, Survey, and Research Directions

Tao Chen et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Computer Science, Information Systems

Security in Software Defined Networks: A Survey

Ijaz Ahmad et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Hardware & Architecture

Software-Defined Wireless Networking: Centralized, Distributed, or Hybrid?

Mehran Abolhasan et al.

IEEE NETWORK (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Detection and Prevention against ARP Poisoning Attack using Modified ICMP and Voting

Prerna Arote et al.

2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE) (2015)