scispace - formally typeset
Open AccessJournal ArticleDOI

A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks

Reads0
Chats0
TLDR
In this article, the authors present a classification approach for existing DoS/DDoS models in different kinds of networks; traditional networks, Software Defined Networks (SDN) and virtual networks.
About
This article is published in Engineering Science and Technology, an International Journal.The article was published on 2021-10-23 and is currently open access. It has received 9 citations till now. The article focuses on the topics: Denial-of-service attack & Computer science.

read more

Citations
More filters
Journal ArticleDOI

A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks

TL;DR: An extensive survey of different detection mechanisms proposed to protect the software-defined networking (SDN) from LDDoS attacks using machine learning approaches is presented and vulnerability issues in all layers of the SDN architecture are described.
Journal ArticleDOI

Optimization of RBF-SVM Kernel Using Grid Search Algorithm for DDoS Attack Detection in SDN-Based VANET

TL;DR: In this paper , the authors proposed an intrusion detection model (IDM) to identify Distributed Denial-of-Service (DDoS) attacks in the vehicular space, which employs the radial basis function (RBF) kernel of the SVM classifier and an exhaustive parameter search technique called grid search cross-validation (GSCV).
Book ChapterDOI

Creation of SDIoT Testbed for DDoS Attack Using Mininet: Experimental Study

TL;DR: In this article , the authors developed a proof-of-concept SDIoT testbed for DDoS attacks using Mininet Emulator, which was used for testing and proposing a solution for a DDoS attack in a SDI-oT environment.
Proceedings ArticleDOI

A Review of Methods to Prevent DDOS Attacks Using NFV and SDN

TL;DR: In this article , the authors investigate and compare DDoS attack defense methods using NFV and SDN, and provide details to help researchers in this field familiarize themselves with DDoS attacks defense methods and choose the appropriate design for their actual implementations.
Posted ContentDOI

A Method for DDOS Attacks Prevention Using SDN and NFV

TL;DR: In this article , the authors use the Moving Target Defense (MTD) idea to change the network routes and services location for specific detection packets to prevent attackers from performing DDOS attacks on real network topologies.
References
More filters
Journal ArticleDOI

OpenFlow: enabling innovation in campus networks

TL;DR: This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day, based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries.
Journal ArticleDOI

Software-Defined Networking: A Comprehensive Survey

TL;DR: This paper presents an in-depth analysis of the hardware infrastructure, southbound and northbound application programming interfaces (APIs), network virtualization layers, network operating systems (SDN controllers), network programming languages, and network applications, and presents the key building blocks of an SDN infrastructure using a bottom-up, layered approach.
Journal ArticleDOI

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

TL;DR: The primary intention for this work is to stimulate the research community into developing creative, effective, efficient, and comprehensive prevention, detection, and response mechanisms that address the DDoS flooding problem before, during and after an actual attack.
Journal ArticleDOI

Effective containment explains subexponential growth in recent confirmed COVID-19 cases in China.

TL;DR: A parsimonious model is introduced that captures both quarantine of symptomatic infected individuals, as well as population-wide isolation practices in response to containment policies or behavioral changes, and shows that the model captures the observed growth behavior accurately.
Journal ArticleDOI

From information security to cyber security

TL;DR: This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous and posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself.
Related Papers (5)