Security and privacy on 6g network edge: A survey

B Mao, J Liu, Y Wu, N Kato - IEEE communications surveys & …, 2023 - ieeexplore.ieee.org
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …

Deep learning for the security of software-defined networks: a review

R Taheri, H Ahmed, E Arslan - Cluster Computing, 2023 - Springer
As the scale and complexity of networks grow rapidly, management, maintenance, and
optimization of them are becoming increasingly challenging tasks for network administrators …

Joint UAV placement optimization, resource allocation, and computation offloading for THz band: A DRL approach

H Wang, H Zhang, X Liu, K Long… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the development of internet of things, latency-sensitive applications such as
telemedicine are constantly emerging. Unfortunately, due to the limited computation capacity …

Multi-path routing algorithm based on deep reinforcement learning for SDN

Y Zhang, L Qiu, Y Xu, X Wang, S Wang, A Paul, Z Wu - Applied Sciences, 2023 - mdpi.com
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial
of Service (DDoS) attacks due to centralized control and flow-table constraints in network …

Security of Topology Discovery Service in SDN: Vulnerabilities and Countermeasures

S Soltani, A Amanlou, M Shojafar… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
Software-Defined Network (SDN) controller needs comprehensive visibility of the whole
network to provide effective routing and forwarding decisions in the data layer. However, the …

A novel link fabrication attack detection method for low-latency SDN networks

Y Liu, Y Wang, H Feng - Journal of Information Security and Applications, 2024 - Elsevier
The application of Software-defined Networking (SDN) in low-latency scenarios, such as 6G,
has received immense attention. Notably, our research reveals that SDN remains …

Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics

D Tang, S Wang, S Zhang, Z Qin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Slow-rate denial-of-service (SDoS) attacks are a type of denial-of-service (DoS) attacks with
a low attack rate. They have a flash-crowd nature and can be well concealed in legitimate …

Rpq: Resilient-priority queue scheduling for delay-sensitive applications

X Li, M Liu, N Cheng, K Liu, W Quan… - 2022 IEEE 23rd …, 2022 - ieeexplore.ieee.org
With the continuous development of autonomous vehicles, telemedicine, digital media and
other time-sensitive applications, a soaring number of network services have high demand …

Intelligent Attack Defense Method Based on Confrontational Training Deep Reinforcement Learning Agents

Y Tang, Y Wang, J Liu, G Gao, H Wang… - Available at SSRN …, 2023 - papers.ssrn.com
TThe utilization of artificial intelligence for automated attacks has emerged as a novel means
of unauthorized infiltration, posing a substantial threat to cyberspace security. Traditional …

Evaluation and Comparison of the Use of Reinforcement Learning Algorithms on SSH Honeypot

MA Kristyanto, MHL Louk - Teknika, 2024 - ejournal.ikado.ac.id
A honeypot is a tool or system used to record, redirect, and even lure hackers into
penetrating and exploiting a system. The increasing development of technology causes …