|
|
|
Ahmed Latif Yaser, Hamdy M. Mousa and Mahmoud Hussein
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network?s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solut...
ver más
|
|
|
|
|
|
|
Sufian Hameed and Hassan Ahmed Khan
Software Defined Networking (SDN) has proved itself to be a backbone in the new network design and is quickly becoming an industry standard. The idea of separation of control plane and data plane is the key concept behind SDN. SDN not only allows us to p...
ver más
|
|
|
|
|
|
|
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu...
ver más
|
|
|
|
|
|
|
Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav Dahal, Wajahat Ali Khan, Asad Masood Khattak and Bashir Hayat
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as severe network security threats. For conventional network security tools it is extremely difficult to distinguish between the higher traffic volume of a DDoS...
ver más
|
|
|
|
|
|
|
Chin-Shiuh Shieh, Wan-Wei Lin, Thanh-Tuan Nguyen, Chi-Hong Chen, Mong-Fong Horng and Denis Miu
DDoS (Distributed Denial of Service) attacks have become a pressing threat to the security and integrity of computer networks and information systems, which are indispensable infrastructures of modern times. The detection of DDoS attacks is a challenging...
ver más
|
|
|
|
|
|
|
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad...
ver más
|
|
|
|
|
|
|
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru...
ver más
|
|
|
|
|
|
|
Hsiao-Chung Lin, Ping Wang and Wen-Hui Lin
Most existing approaches for solving the distributed denial-of-service (DDoS) problem focus on specific security mechanisms, for example, network intrusion detection system (NIDS) detection and firewall configuration, rather than on the packet routing ap...
ver más
|
|
|
|
|
|
|
Petr Dzurenda,Zdenek Martinasek,Lukas Malina
Pág. 8 - 14
The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS). The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and d...
ver más
|
|
|
|
|
|
|
Amthal K. Mousa and Mohammed Najm Abdullah
The software defined network (SDN) collects network traffic data and proactively manages networks. SDN?s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data cent...
ver más
|
|
|
|
|
|
|
Ruikui Ma, Qiuqian Wang, Xiangxi Bu and Xuebin Chen
With the development of the Internet of Things, a huge number of devices are connected to the network, network traffic is exhibiting massive and low latency characteristics. At the same time, it is becoming cheaper and cheaper to launch DDoS attacks, and...
ver más
|
|
|
|
|
|
|
Evangelos D. Spyrou, Ioannis Tsoulos and Chrysostomos Stylios
Software-Defined Networking (SDN) stands as a pivotal paradigm in network implementation, exerting a profound influence on the trajectory of technological advancement. The critical role of security within SDN cannot be overstated, with distributed denial...
ver más
|
|
|
|
|
|
|
Seongmin Park, Byungsun Cho, Dowon Kim and Ilsun You
Research to deal with distributed denial of service (DDoS) attacks was kicked off from long ago and has seen technological advancement along with an extensive 5G footprint. Prior studies, and still newer ones, in the realm of DDoS attacks in the 5G envir...
ver más
|
|
|
|
|
|
|
(1) Aween Abubakr Saeed (Sulaimani Polytechnic University, Iraq) (2) Noor Ghazi Mohammed Jameel (Sulaimani Polytechnic University, Iraq)
Pág. 37 - 48
The explosive development of information technology is increasingly rising cyber-attacks. Distributed denial of service (DDoS) attack is a malicious threat to the modern cyber-security world, which causes performance disruption to the network servers. It...
ver más
|
|
|
|
|
|
|
Wentao Wang, Xuan Ke and Lingxia Wang
A data center network is vulnerable to suffer from concealed low-rate distributed denial of service (L-DDoS) attacks because its data flow has the characteristics of data flow delay, diversity, and synchronization. Several studies have proposed addressin...
ver más
|
|
|
|
|
|
|
Wentao Wang, Xuan Ke and Lingxia Wang
A data center network is vulnerable to suffer from concealed low-rate distributed denial of service (L-DDoS) attacks because its data flow has the characteristics of data flow delay, diversity, and synchronization. Several studies have proposed addressin...
ver más
|
|
|
|
|
|
|
Tuka Kareem Jebur
Pág. pp. 141 - 154
|
|
|
|
|
|
|
Changui Lee and Seojeong Lee
The maritime industry, which transports approximately 90% of the world?s goods, plays a crucial role in the global economy. However, increasing reliance on digital technologies has made the industry vulnerable to cybersecurity threats that may compromise...
ver más
|
|
|
|
|
|
|
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad and Attaullah Buriro
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this p...
ver más
|
|
|
|
|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|