In-band network telemetry: A survey
With the development of software-defined network and programmable data-plane
technology, in-band network telemetry has emerged. In-band network telemetry technology …
technology, in-band network telemetry has emerged. In-band network telemetry technology …
Big data analytics in telecommunications: literature review and architecture recommendations
This paper focuses on facilitating state-of-the-art applications of big data analytics (BDA)
architectures and infrastructures to telecommunications (telecom) industrial sector. Telecom …
architectures and infrastructures to telecommunications (telecom) industrial sector. Telecom …
Elastic and reliable bandwidth reservation based on distributed traffic monitoring and control
X Zhang, T Wang - IEEE Transactions on Parallel and …, 2022 - ieeexplore.ieee.org
Bandwidth reservation can effectively improve the service quality for data transfers because
of dedicated network resources. However, it is difficult to achieve a desired tradeoff between …
of dedicated network resources. However, it is difficult to achieve a desired tradeoff between …
Performance evaluation using RYU SDN controller in software-defined networking environment
S Bhardwaj, SN Panda - Wireless Personal Communications, 2022 - Springer
Software-defined networking (SDN) is a new approach that overcomes the obstacles which
are faced by conventional networking architecture. The core idea of SDN is to separate the …
are faced by conventional networking architecture. The core idea of SDN is to separate the …
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions
Software Defined network (SDN) represents a sophisticated networking approach that
separates the control logic from the data plane. This separation results in a loosely coupled …
separates the control logic from the data plane. This separation results in a loosely coupled …
An efficient IDS framework for DDoS attacks in SDN environment
JE Varghese, B Muniyal - IEEE Access, 2021 - ieeexplore.ieee.org
The rapid usage of the Internet for the last few decades has lead to the deployment of high-
speed networks in commercial and educational institutions. As network traffic is increasing …
speed networks in commercial and educational institutions. As network traffic is increasing …
Detection and classification of DDoS flooding attacks on software-defined networks: A case study for the application of machine learning
Software-defined networks (SDNs) offer robust network architectures for current and future
Internet of Things (IoT) applications. At the same time, SDNs constitute an attractive target for …
Internet of Things (IoT) applications. At the same time, SDNs constitute an attractive target for …
Seeing traffic paths: Encrypted traffic classification with path signature features
Although many network traffic protection methods have been developed to protect user
privacy, encrypted traffic can still reveal sensitive user information with sophisticated …
privacy, encrypted traffic can still reveal sensitive user information with sophisticated …
Real-time monitoring as a supplementary security component of vigilantism in modern network environments
The phenomenon of network vigilantism is autonomously attributed to how anomalies and
obscure activities from adversaries can be tracked in real-time. Needless to say, in today's …
obscure activities from adversaries can be tracked in real-time. Needless to say, in today's …
Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models
Z Yao, J Ge, Y Wu, X Lin, R He, Y Ma - Journal of Network and Computer …, 2020 - Elsevier
To protect user privacy (eg, IP address and sensitive data in a packet), many traffic
protection methods, like traffic obfuscation and encryption technologies, are introduced …
protection methods, like traffic obfuscation and encryption technologies, are introduced …