4.7 Article

From Replay to Regeneration: Recovery of UDP Flood Network Attack Scenario Based on SDN

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

An Effective Reconstruction Method of the APT Attack Based on Hidden Markov Model

Yonghui Huang et al.

Summary: This paper introduces a method for reconstructing APT attack scenes. By mining hidden attack events, describing action sequences, and reconstructing attack paths, the detection of APT attack processes and the reconstruction of attack scenes are achieved.

JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2022)

Article Computer Science, Hardware & Architecture

MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion

Beifeng Mao et al.

Summary: This paper focuses on using IDS' alerts corresponding to abnormal traffic to correlate attacks detected by the IDS, reconstruct multi-step attack scenarios, and discover attack chains. Many false positives in the information provided by IDS make accurate reconstruction of the attack scenario and extraction of the most critical attack chain challenging.

COMPUTER NETWORKS (2021)

Proceedings Paper

Containerchain: A Blockchain System Emulator based on Mininet and Containers

Saul Gill et al.

Summary: This paper introduces a tool called Containerchain to simplify the deployment of large Blockchain systems for researchers. With Containerchain, users can control the number of nodes in the system, the consensus mechanism used, and observe and analyze network traffic within the Blockchain. The goal of the tool is to allow researchers to focus more on their actual research rather than network setup.

2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2021) (2021)

Article Computer Science, Hardware & Architecture

Transition to SDN is HARMLESS: Hybrid Architecture for Migrating Legacy Ethernet Switches to SDN

Levente Csikor et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2020)

Article Engineering, Electrical & Electronic

RouteNet: Leveraging Graph Neural Networks for Network Modeling and Optimization in SDN

Krzysztof Rusek et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Proceedings Paper Computer Science, Information Systems

DDoSNet: A Deep-Learning Model for Detecting Network Attacks

Mahmoud Said Elsayed et al.

2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020) (2020)

Article Computer Science, Information Systems

A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning

Jesus Arturo Perez-Diaz et al.

IEEE ACCESS (2020)

Proceedings Paper Computer Science, Information Systems

Evaluation of TCP and UDP Traffic over Software-Defined Networking

May Thae Naing et al.

2019 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION TECHNOLOGIES (ICAIT) (2019)

Article Computer Science, Information Systems

An Interactive Traffic Replay Method in a Scaled-Down Environment

Hongri Liu et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Hybrid SDN Networks: A Survey of Existing Approaches

Rashid Amin et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Modeling for Traffic Replay in Virtual Network

Lun Li et al.

IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS) (2018)