4.6 Article

TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking

Amir Javadpour et al.

Summary: This paper examines resource management in network virtualization and proposes an improved method by combining Markov-Process and TDMA protocol to optimize network resource utilization. Simulation results demonstrate improvements in delay and costs compared to relevant studies.

JOURNAL OF SUPERCOMPUTING (2022)

Article Chemistry, Analytical

DDoS Flood and Destination Service Changing Sensor

Fu-Hau Hsu et al.

Summary: This paper introduces a kernel-based mechanism and lightweight flooding attack detection mechanism, successfully detecting and defending against flooding DDoS attacks. Additionally, by collaborating with a specific low-cost network architecture, it effectively defends against DDoS attacks.

SENSORS (2021)

Article Computer Science, Information Systems

AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller

Nagarathna Ravi et al.

Summary: SDN separates the control and data planes, but may fail when the controller is flooded with SYN packets. To address this issue, the authors propose AEGIS, a mechanism in SDN that improves malicious SYN identification accuracy and reduces TCP connection setup time in the absence of flood attacks.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Computer Science, Information Systems

Blockchain Technology for Secured Healthcare Data Communication among the Non-Terminal Nodes in IoT Architecture in 5G Network

Parvathaneni Naga Srinivasu et al.

Summary: With the advancement of healthcare data sharing, protecting data security has become one of the key challenges in IoT healthcare monitoring frameworks. This article proposes an encryption solution based on Blockchain technology, which effectively addresses data security issues and outperforms its counterparts in performance evaluation.

ELECTRONICS (2021)

Article Computer Science, Information Systems

A DDoS Attack Mitigation Scheme in ISP Networks Using Machine Learning Based on SDN

Nguyen Ngoc Tuan et al.

ELECTRONICS (2020)

Article Computer Science, Information Systems

A-CAFDSP: An Adaptive-Congestion Aware Fibonacci Sequence based Data Scheduling Policy

Varun Kumar Sharma et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Adaptive burst reordering for burst -cluster transmission to improve fairness in OBS networks

Badr Oulad Nassar et al.

JOURNAL OF HIGH SPEED NETWORKS (2020)

Article Telecommunications

Using Markov Learning Utilization Model for Resource Allocation in Cloud of Thing Network

Seyedeh Maedeh Mirmohseni et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Telecommunications

Resource Management in a Peer to Peer Cloud Network for IoT

Amir Javadpour et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Review Computer Science, Information Systems

Packet analysis for network forensics: A comprehensive survey

Leslie F. Sikos

FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION (2020)

Article Computer Science, Theory & Methods

CL-ADSP: Cross-Layer Adaptive Data Scheduling Policy in Mobile Ad-hoc Networks

Varun Kumar Sharma et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

DDoS detection and defense mechanism based on cognitive-inspired computing in SDN

Jie Cui et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Hardware & Architecture

SDN-Based SYN ProxyA Solution to Enhance Performance of Attack Mitigation Under TCP SYN Flood

Dang Van Tuyen et al.

COMPUTER JOURNAL (2019)

Article Telecommunications

SDN-Assisted Slow HTTP DDoS Attack Defense Method

Kiwon Hong et al.

IEEE COMMUNICATIONS LETTERS (2018)

Article Computer Science, Information Systems

SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN

Prashant Kumar et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)

Article Computer Science, Information Systems

Adaptive congestion control scheme in mobile ad-hoc networks

Varun Kumar Sharma et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Computer Science, Information Systems

SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks

Reza Mohammadi et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2017)

Article Computer Science, Information Systems

SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks

Reza Mohammadi et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2017)

Review Multidisciplinary Sciences

DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions

Narmeen Zakaria Bawany et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2017)

Article Engineering, Electrical & Electronic

Software-Defined Networking: A Comprehensive Survey

Diego Kreutz et al.

PROCEEDINGS OF THE IEEE (2015)