Resource provisioning in edge/fog computing: A comprehensive and systematic review

A Shakarami, H Shakarami, M Ghobaei-Arani… - Journal of Systems …, 2022 - Elsevier
Close computing paradigms such as fog and edge have become promising technologies for
mobile applications running on pervasive mobile equipment utilized by a wide range of …

A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture

K Kaur, V Mangat, K Kumar - Computer Networks, 2022 - Elsevier
Abstract Nowadays, Network Function Virtualization (NFV) is a growing and powerful
technology in the research community and IT world. Traditional computer networks consist of …

ML-based pre-deployment SDN performance prediction with neural network boosting regression

W Jiang, H Han, M He, W Gu - Expert Systems with Applications, 2024 - Elsevier
Software defined networking (SDN) has been proposed as an effective approach to improve
network management efficiency and increase network intelligence in various networks …

SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks

D Tang, D Zhang, Z Qin, Q Yang, S Xiao - Journal of Network and …, 2023 - Elsevier
The simplified data plane of Software-Defined Network (SDN) should be able to process
packets from the entire network. However, the flow table size constrains the data plane …

Network queuing assessment: A method to detect bottlenecks in service function chaining

A Heideker, C Kamienski - IEEE Transactions on network and …, 2022 - ieeexplore.ieee.org
Virtualization and softwarization have driven the widespread adoption of the cloud
computing paradigm, with savings in CAPEX, OPEX, and environmental footprint, by …

A comprehensive plane-wise review of DDoS attacks in SDN: Leveraging detection and mitigation through machine learning and deep learning

D Kalambe, D Sharma, P Kadam, S Surati - Journal of Network and …, 2024 - Elsevier
The traditional architecture of networks in Software Defined Networking (SDN) is divided into
three distinct planes to incorporate intelligence into networks. However, this structure has …

[PDF][PDF] Detecting DDoS attacks in software defined networks using deep learning techniques: a survey

NP Mwanza, J Kalita - Int. J. Netw. Secur., 2023 - ijns.jalaxy.com.tw
Deep Learning (DL) is increasingly being used in Software Defined Networks (SDNs) to
detect Distributed Denial of Service (DDoS) attacks because of high attack detection …

Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks

S Bhardwaj, M Dave - Telecommunication Systems, 2024 - Springer
This article focuses on the urgent cybersecurity concerns in the Internet of Things (IoT)
environment, highlighting the crucial importance of protecting these networks in the face of …

VINEVI: a virtualized network vision architecture for smart monitoring of heterogeneous applications and infrastructures

R Moreira, HGVO da Cunha, LFR Moreira… - … Conference on Advanced …, 2022 - Springer
Monitoring heterogeneous infrastructures and applications is essential to cope with user
requirements properly, but it still lacks enhancements. The well-known state-of-the-art …

Recovering Missing Monitoring Data to Enhance Service Provisioning in the Edge-to-Cloud Continuum

GF Pittalà, C Zilli, N Di Cicco, G Davoli… - 2024 IEEE 10th …, 2024 - ieeexplore.ieee.org
Efficient service provisioning in the Edge-to-Cloud Continuum is of utmost importance for
modern applications. While sensible decisions can be taken if enough monitoring data is …