A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks
Juan Fernando Balarezo,Song Wang,Karina Gomez Chavez,Akram Al-Hourani,Sithamparanathan Kandeepan +4 more
Reads0
Chats0
TLDR
In this article, the authors present a classification approach for existing DoS/DDoS models in different kinds of networks; traditional networks, Software Defined Networks (SDN) and virtual networks.About:
This article is published in Engineering Science and Technology, an International Journal.The article was published on 2021-10-23 and is currently open access. It has received 9 citations till now. The article focuses on the topics: Denial-of-service attack & Computer science.read more
Citations
More filters
Journal ArticleDOI
A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks
A. Alashhab,M. Soperi Mohd Zahid,Mohamed Mostafa Abdel-Azim,Muhammad Yunis Daha,Babangida Isyaku,Shimhaz Ali +5 more
TL;DR: An extensive survey of different detection mechanisms proposed to protect the software-defined networking (SDN) from LDDoS attacks using machine learning approaches is presented and vulnerability issues in all layers of the SDN architecture are described.
Journal ArticleDOI
Optimization of RBF-SVM Kernel Using Grid Search Algorithm for DDoS Attack Detection in SDN-Based VANET
TL;DR: In this paper , the authors proposed an intrusion detection model (IDM) to identify Distributed Denial-of-Service (DDoS) attacks in the vehicular space, which employs the radial basis function (RBF) kernel of the SVM classifier and an exhaustive parameter search technique called grid search cross-validation (GSCV).
Book ChapterDOI
Creation of SDIoT Testbed for DDoS Attack Using Mininet: Experimental Study
TL;DR: In this article , the authors developed a proof-of-concept SDIoT testbed for DDoS attacks using Mininet Emulator, which was used for testing and proposing a solution for a DDoS attack in a SDI-oT environment.
Proceedings ArticleDOI
A Review of Methods to Prevent DDOS Attacks Using NFV and SDN
TL;DR: In this article , the authors investigate and compare DDoS attack defense methods using NFV and SDN, and provide details to help researchers in this field familiarize themselves with DDoS attacks defense methods and choose the appropriate design for their actual implementations.
Posted ContentDOI
A Method for DDOS Attacks Prevention Using SDN and NFV
TL;DR: In this article , the authors use the Moving Target Defense (MTD) idea to change the network routes and services location for specific detection packets to prevent attackers from performing DDOS attacks on real network topologies.
References
More filters
Journal ArticleDOI
OpenFlow: enabling innovation in campus networks
Nick McKeown,Thomas Anderson,Hari Balakrishnan,Guru Parulkar,Larry L. Peterson,Jennifer Rexford,Scott Shenker,Jonathan S. Turner +7 more
TL;DR: This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day, based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries.
Journal ArticleDOI
Software-Defined Networking: A Comprehensive Survey
Diego Kreutz,Fernando M. V. Ramos,Paulo Veríssimo,Christian Esteve Rothenberg,Siamak Azodolmolky,Steve Uhlig +5 more
TL;DR: This paper presents an in-depth analysis of the hardware infrastructure, southbound and northbound application programming interfaces (APIs), network virtualization layers, network operating systems (SDN controllers), network programming languages, and network applications, and presents the key building blocks of an SDN infrastructure using a bottom-up, layered approach.
Journal ArticleDOI
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
TL;DR: The primary intention for this work is to stimulate the research community into developing creative, effective, efficient, and comprehensive prevention, detection, and response mechanisms that address the DDoS flooding problem before, during and after an actual attack.
Journal ArticleDOI
Effective containment explains subexponential growth in recent confirmed COVID-19 cases in China.
TL;DR: A parsimonious model is introduced that captures both quarantine of symptomatic infected individuals, as well as population-wide isolation practices in response to containment policies or behavioral changes, and shows that the model captures the observed growth behavior accurately.
Journal ArticleDOI
From information security to cyber security
TL;DR: This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous and posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of information resources, but also that of other assets, including the person him/herself.
Related Papers (5)
Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN
Neelam Dayal,Shashank Srivastava +1 more