Renyi joint entropy-based dynamic threshold approach to detect DDoS attacks against SDN controller with various traffic rates
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-
defined networking (SDN) more vulnerable to the depletion of controller resources. DDoS …
defined networking (SDN) more vulnerable to the depletion of controller resources. DDoS …
Overview of DDoS attack detection in software-defined networks
H Wang, Y Li - IEEE Access, 2024 - ieeexplore.ieee.org
Software Defined network (SDN), as a new network architecture, is the direction of future
network development. By decoupling the control plane and data plane of the network, the …
network development. By decoupling the control plane and data plane of the network, the …
Effectiveness of an entropy-based approach for detecting low-and high-rate DDoS attacks against the SDN controller: Experimental analysis
Software-defined networking (SDN) is a unique network architecture isolating the network
control plane from the data plane, offering programmable elastic features that allow network …
control plane from the data plane, offering programmable elastic features that allow network …
FL-CTIF: A federated learning based CTI framework based on information fusion for secure IIoT
Abstract Industrial Internet of Things (IIoT) are evolving and transitioning into virtual entities
supported by digital twin technology to optimize existing processes further and improve their …
supported by digital twin technology to optimize existing processes further and improve their …
[PDF][PDF] Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller.
The emergence of a new network architecture, known as Software Defined Networking
(SDN), in the last two decades has overcome some drawbacks of traditional networks in …
(SDN), in the last two decades has overcome some drawbacks of traditional networks in …
A hybrid deep learning model for detecting DDoS flooding attacks in SIP-based systems
OS Younes - Computer Networks, 2024 - Elsevier
Abstract The Session Initiation Protocol (SIP) is widely used for multimedia communication
as a signaling protocol to manage, establish, maintain, and terminate multimedia sessions …
as a signaling protocol to manage, establish, maintain, and terminate multimedia sessions …
Synchronizing real-time and high-precision LDoS defense of learning model-based in AIoT with programmable data plane, SDN
J Ma, W Su, Y Li, Y Yuan, Z Zhang - Journal of Network and Computer …, 2024 - Elsevier
The availability of SD-AIoT is currently under complicated and serious cyber threats,
especially Low-rate Denial-of-Service attacks. However, traditional defense schemes for …
especially Low-rate Denial-of-Service attacks. However, traditional defense schemes for …
SynFloWatch: A Detection System against TCP-SYN based DDoS Attacks using Entropy in Hybrid SDN
M Sinha - Proceedings of the 25th International Conference on …, 2024 - dl.acm.org
The emergence of hybrid software-defined networks (SDNs) that combine traditional
network infrastructure with SDN creates new security challenges, particularly regarding TCP …
network infrastructure with SDN creates new security challenges, particularly regarding TCP …
[PDF][PDF] Implementation of entropy-based DDoS attack detection method in different SDN topologies
MA Mohsin, AH Hamad - American Academic Scientific Research …, 2022 - core.ac.uk
Abstract Software-Defined Network (SDN) brings a lot of advantages to the world of
networking through its flexibility and centralized management, but this centralized control …
networking through its flexibility and centralized management, but this centralized control …
Propose a flow-based approach for detecting abnormal behavior in neighbor discovery protocol (NDP)
AA Bahashwan, M Anbar, S Manickam… - … on Advances in Cyber …, 2021 - Springer
Abstract Neighbour Discovery Protocol is vulnerable to various attacks, such as DoS
flooding attack that uses excessive amount of Router Advertisement (RA) and Neighbour …
flooding attack that uses excessive amount of Router Advertisement (RA) and Neighbour …