Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI and MTD Approaches to Security Solutions

AH Abdi, L Audah, A Salh, MA Alhartomi… - IEEE …, 2024 - ieeexplore.ieee.org
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed
network management significantly. By integrating data and control, SDN offers unparalleled …

[HTML][HTML] Network Security Challenges and Countermeasures for Software-Defined Smart Grids: A Survey

D Agnew, S Boamah, A Bretas, J McNair - Smart Cities, 2024 - mdpi.com
The rise of grid modernization has been prompted by the escalating demand for power, the
deteriorating state of infrastructure, and the growing concern regarding the reliability of …

[HTML][HTML] Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM …

Z Ashraf, A Sohail, M Iqbal - Cryptography, 2024 - mdpi.com
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture
quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will …

On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey

CD Motero, JRB Higuera, JB Higuera… - IEEE …, 2021 - ieeexplore.ieee.org
Organizations use Active Directory Windows service to authenticate users in a network with
the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its …

A Survey of Software-Defined Smart Grid Networks: Security Threats and Defense Techniques

D Agnew, S Boamah, J McNair - arXiv preprint arXiv:2306.14697, 2023 - arxiv.org
Smart grids are replacing conventional power grids due to rising electricity use, failing
infrastructure, and reliability problems. Two-way communication, demand-side …

Secure Host Login Technique based Key Agreement protocol for Software Defined Network

A Bhardwaj, H Mutaher - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
Scalability is one of the Software Defined Network features that makes it more efficient than
the traditional network. Due to this feature, a huge number of hosts connect to the network …

Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP

SD Mediana, M Fadhli - Sistemasi: Jurnal Sistem …, 2023 - sistemasi.ftik.unisi.ac.id
In order to remove trust presumptions towards the internal network, this study addresses the
use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is …

[PDF][PDF] Security & Privacy Comparison of NextCloud vs Dropbox: A Survey

A Olaosebikan, TPBM Dissanayaka… - Midwest Instruction …, 2022 - micsymposium.org
In recent years cloud computing has moved from an idea phase to a necessity in the
business and personal use world, it has gone from being a theory to being an easily …

User Authentication and Authorization While Accessing a Virtual Laboratory

VS Gnesdilov, YB Mironov, IG Buzhin… - 2024 Systems of …, 2024 - ieeexplore.ieee.org
A virtual laboratory of modern network technologies was created to enable the laboratory to
function without constant supervision from teaching staff, allow for individualization of the …

A Robust Authentication Technique for Client–Server Secure Login

LD Anh, H Mutaher, A Bijalwan - Creative Approaches Towards …, 2024 - Wiley Online Library
Client–server security faces significant challenges, including the risk of Man‐in‐the‐Middle
attacks (MITM), data confidentiality, integrity, authentication concerns, and the need to adapt …