4.6 Article

P-IOTA: A Cloud-Based Geographically Distributed Threat Alert System That Leverages P4 and IOTA

Related references

Note: Only part of the references are listed.
Article Telecommunications

A security and performance analysis of proof-based consensus protocols

Gabriel Antonio F. Rebello et al.

Summary: Blockchain is a disruptive technology with vulnerabilities and performance limitations in consensus protocols; proof-based protocols are more suitable for public environments like IoT; IOTA consensus protocol shows certain security features for IoT environment.

ANNALS OF TELECOMMUNICATIONS (2022)

Article Computer Science, Information Systems

Evolution of Internet of Things From Blockchain to IOTA: A Survey

Mays Alshaikhli et al.

Summary: Internet of Things (IoT) has become a new paradigm with interconnected devices in various applications. The use of traditional security mechanisms is not sufficient to address the security risks associated with IoT, thus Distributed Ledger Technology (DLT) emerges as a potential solution to mitigate these risks.

IEEE ACCESS (2022)

Review Computer Science, Hardware & Architecture

A comprehensive survey of vulnerability and information security in SDN

Raktim Deb et al.

Summary: This article introduces the advantages of SDN over traditional networks and points out the threat surfaces that exist due to weak information security. By detailing each part of SDN, it aims to communicate the current trends of SDN to researchers and professionals, helping them improve SDN structurally or functionally.

COMPUTER NETWORKS (2022)

Article Computer Science, Hardware & Architecture

Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain

Aldo Febro et al.

Summary: This article introduces an inter-organization collaborative defense framework using P4, SDN, and Blockchain to mitigate Botnet-originated DDoS attacks. The framework successfully synchronizes packet filters for different organizations and improves the ability to defend against Botnet attacks.

COMPUTER NETWORKS (2022)

Article Computer Science, Hardware & Architecture

A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN

Ramin Fadaei Fouladi et al.

Summary: Software Defined Networking brings new functionalities for network management and security, but DDoS attacks still pose a threat. Existing detection approaches based on statistical and machine learning methods have limitations. This study proposes a scheme using wavelet transform and auto-encoder neural network for DDoS attack detection in SDN, achieving high detection rate and low false alarm rate against specific attack types.

COMPUTER NETWORKS (2022)

Article Computer Science, Information Systems

A Comparative Study of Consensus Mechanisms in Blockchain for IoT Networks

Zachary Auhl et al.

Summary: Consensus mechanisms are crucial for Blockchain technology, and they can be utilized in the Internet of Things (IoT) despite the lack of computational resources. Purpose-made IoT consensus mechanisms like PoSCS and Microchain are well suited for IoT consensus.

ELECTRONICS (2022)

Article Computer Science, Information Systems

P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane

Andrea Melis et al.

Summary: This manuscript presents an original implementation of network management functions in the context of Software Defined Networking, integrating an artificial intelligence driven management system, an SDN control plane, and a programmable data plane. Constraint Programming is used to implement a management operating system that accepts high level specifications and translates them into technology-specific constraints and directives for the SDN control plane.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Computer Science, Information Systems

In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches

Damu Ding et al.

Summary: This paper introduces a new sketch-based data structure BACON for estimating flow cardinality and applies it to the INDDoS strategy for DDoS victim identification. The hardware implementation on a programmable switch is described, showcasing experimental performance measurements.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Proceedings Paper Computer Science, Information Systems

A Security Monitoring Architecture based on Data Plane Programmability

Amir Alsadi et al.

Summary: Software Defined Networking emphasizes effective algorithms for the control plane, but pure centralization introduces inefficiencies and limitations, so network applications can benefit from data plane programmability for security purposes.

2021 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT (EUCNC/6G SUMMIT) (2021)

Article Computer Science, Information Systems

SmartBlock-SDN: An Optimized Blockchain-SDN Framework for Resource Management in IoT

Anichur Rahman et al.

Summary: SDN and Blockchain technologies provide a robust and reliable platform for secure network communication in the IoT ecosystem. This research proposes a hierarchical architecture for a distributed yet efficient Blockchain-enabled SDN-IoT framework, ensuring efficient cluster-head selection and secure network communication by identifying and isolating rogue switches. The proposed framework demonstrates optimized energy-utilization, end-to-end delay, and throughput in simulation, achieving efficiency and security in smart networks.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking

Abbas Yazdinejad et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security

Abbas Yazdinejad et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Proceedings Paper Telecommunications

Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane

Ting-Yu Lin et al.

APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS) (2020)

Article Computer Science, Information Systems

Cochain-SC: An Intra- and Inter-Domain Ddos Mitigation Scheme Based on Blockchain Using SDN and Smart Contract

Zakaria Abou El Houda et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Software Engineering

Blockchain and Scalability

Anamika Chauhan et al.

2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C) (2018)

Article Engineering, Electrical & Electronic

DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks

Pradip Kumar Sharma et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Information Systems

Software Defined Networking Architecture, Security and Energy Efficiency: A Survey

Danda B. Rawat et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Review Computer Science, Hardware & Architecture

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

Opeyemi Osanaiye et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Engineering, Electrical & Electronic

Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing

Qiao Yan et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Proceedings Paper Computer Science, Hardware & Architecture

Fingerprinting Software-defined Networks

Roberto Bifulco et al.

2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP) (2015)

Article Computer Science, Information Systems

Programming Protocol-Independent Packet Processors

Pat Bosshart et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2014)