Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI and MTD Approaches to Security Solutions
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed
network management significantly. By integrating data and control, SDN offers unparalleled …
network management significantly. By integrating data and control, SDN offers unparalleled …
[HTML][HTML] Network Security Challenges and Countermeasures for Software-Defined Smart Grids: A Survey
The rise of grid modernization has been prompted by the escalating demand for power, the
deteriorating state of infrastructure, and the growing concern regarding the reliability of …
deteriorating state of infrastructure, and the growing concern regarding the reliability of …
[HTML][HTML] Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM …
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture
quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will …
quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will …
On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey
CD Motero, JRB Higuera, JB Higuera… - IEEE …, 2021 - ieeexplore.ieee.org
Organizations use Active Directory Windows service to authenticate users in a network with
the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its …
the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its …
A Survey of Software-Defined Smart Grid Networks: Security Threats and Defense Techniques
Smart grids are replacing conventional power grids due to rising electricity use, failing
infrastructure, and reliability problems. Two-way communication, demand-side …
infrastructure, and reliability problems. Two-way communication, demand-side …
Secure Host Login Technique based Key Agreement protocol for Software Defined Network
A Bhardwaj, H Mutaher - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
Scalability is one of the Software Defined Network features that makes it more efficient than
the traditional network. Due to this feature, a huge number of hosts connect to the network …
the traditional network. Due to this feature, a huge number of hosts connect to the network …
Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP
SD Mediana, M Fadhli - Sistemasi: Jurnal Sistem …, 2023 - sistemasi.ftik.unisi.ac.id
In order to remove trust presumptions towards the internal network, this study addresses the
use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is …
use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is …
[PDF][PDF] Security & Privacy Comparison of NextCloud vs Dropbox: A Survey
A Olaosebikan, TPBM Dissanayaka… - Midwest Instruction …, 2022 - micsymposium.org
In recent years cloud computing has moved from an idea phase to a necessity in the
business and personal use world, it has gone from being a theory to being an easily …
business and personal use world, it has gone from being a theory to being an easily …
User Authentication and Authorization While Accessing a Virtual Laboratory
VS Gnesdilov, YB Mironov, IG Buzhin… - 2024 Systems of …, 2024 - ieeexplore.ieee.org
A virtual laboratory of modern network technologies was created to enable the laboratory to
function without constant supervision from teaching staff, allow for individualization of the …
function without constant supervision from teaching staff, allow for individualization of the …
A Robust Authentication Technique for Client–Server Secure Login
LD Anh, H Mutaher, A Bijalwan - Creative Approaches Towards …, 2024 - Wiley Online Library
Client–server security faces significant challenges, including the risk of Man‐in‐the‐Middle
attacks (MITM), data confidentiality, integrity, authentication concerns, and the need to adapt …
attacks (MITM), data confidentiality, integrity, authentication concerns, and the need to adapt …