Adaptive Countermeasure by Credibility to Defend SDN Controllers Against BlackNurse-SC Attacks

YC Wang, PY Wang - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
… the controller against BlackNurse-SC attacks, we propose an adaptive countermeasure by
… Simulation results reveal that the ACC scheme can protect a controller from BlackNurseSC

Denial of firewalling attacks (dof): The case study of the emerging blacknurse attack

Z Trabelsi, S Zeidan, K Hayawi - IEEE Access, 2019 - ieeexplore.ieee.org
… time needed for a countermeasure c to gain … BlackNurse vulnerability that exists but is not
launched currently. We believe that TTD is adapted such that the likelihood of the BlackNurse

Thwarting ICMP low-rate attacks against firewalls while minimizing legitimate traffic loss

K Hayawi, Z Trabelsi, S Zeidan, MM Masud - IEEE Access, 2020 - ieeexplore.ieee.org
… The rejection rule has certain adaptive activity time, during which the … countermeasure c
(eg access control policy) to gain some level of control on some attack vector A (eg BlackNurse

A comprehensive survey on SDN and blockchain-based secure vehicular networks

IM Varma, N Kumar - Vehicular Communications, 2023 - Elsevier
… These advantageous characteristics of SDN have improved their practical adaptation in
various wireless access networks like VANETs, termed software-defined vehicular networks (…

[图书][B] Implications of Disaster Preparedness for Nursing, An Issue of Nursing Clinics of North America

DJ Persell - 2016 - books.google.com
… Skills learned in the US federal all-hazards approach to disasters can then be adapted to …
Establishing, maintaining, or enhancing medical countermeasure caches to protect health care …

A systematic literature review of offensive and defensive security solutions with software defined network

A Melis, A Al Sadi, D Berardi, F Callegati… - IEEE …, 2023 - ieeexplore.ieee.org
… Moreover, it allows network reconfiguration and adaptation to different application scenarios
… information security issues and possible countermeasures to guarantee confidentiality, …

[PDF][PDF] Building affordable intrusion detection system for internet of things

M Haroon - 2018 - duo.uio.no
… While in detection approach, it is hybrid in nature, such that it is self-adapting knowledge-driven
IoT intrusion detection system which can work on different communication protocols. …

[PDF][PDF] A Comprehensive Study on Intrusion and Extrusion Phenomena

MA Hamid, M Akter, MF Mridha… - International Journal of …, 2021 - academia.edu
Black nurse attack is one of the most common organizational names of IP fragmentation
attack… section describes all possible extrusion events and the related existing counter measures. …

392 Marshall Field

F Adams, M In - The Civil War Era and Reconstruction: An …, 2015 - books.google.com
… moved the rebel treasury to Columbia, South Carolina. After the failure of that campaign, …
pulleys; orthopedist Lewis Albert Sayre adapted plaster of Paris bandaging at Bellevue Hospital …

Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions

J Park, M Mohaisen, DH Nyang, A Mohaisen - Computer Networks, 2020 - Elsevier
… the effectiveness of an attack in a more realistic scenario, we can see that there is a lower
level of risk than previously stated, and it would be desirable to find a countermeasure in place …