Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN

SQA Shah, FZ Khan, M Ahmad - Computer Communications, 2022 - Elsevier
Cloud Computing provides an auto-scaling feature for dynamic resource utilization to cope
with their customers' requirements and charge as 'pay-per-use'. Attackers get the benefit of …

Aegis: Detection and mitigation of tcp syn flood on sdn controller

N Ravi, SM Shalinie, C Lal… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Software-Defined Network (SDN) segregates the control plane and the data plane to bring
about a programmable network. The controller at the control plane runs network modules …

BDF-SDN: A big data framework for DDoS attack detection in large-scale SDN-based cloud

PT Dinh, M Park - 2021 IEEE Conference on Dependable and …, 2021 - ieeexplore.ieee.org
Software-defined networking (SDN) nowadays is extensively being used in a variety of
practical settings, provides a new way to manage networks by separating the data plane …

Cross‐Plane DDoS Attack Defense Architecture Based on Flow Table Features in SDN

M Yue, Q Yan, H Zheng, Z Wu - Security and Communication …, 2022 - Wiley Online Library
Software‐Defined Networking (SDN) actualizes the separation of control and forwarding and
innovates network functionalities with a logically centralized controller. Contemporary SDN …

DataPlane‐ML: an integrated attack detection and mitigation solution for software defined networks

RN Carvalho, LR Costa, JL Bordim… - Concurrency and …, 2023 - Wiley Online Library
Software defined network (SDN) is a paradigm that emphasizes the separation of the control
plane from the data plane, offering advantages such as flexibility and programmability …

Detection and prevention of UDP reflection amplification attack in WSN using cumulative sum algorithm

BJS Kumar, VSS Gowda - 2022 IEEE International Conference …, 2022 - ieeexplore.ieee.org
Wireless sensor networks are used in many areas such as war field surveillance, monitoring
of patient, controlling traffic, environmental and building surveillance. Wireless technology …

Detection and Prevention of TCP SYN Flooding Attack in WSN Using Protocol Dependent Detection and Classification System

BJS Kumar, KRK Gowda - 2022 IEEE International Conference …, 2022 - ieeexplore.ieee.org
In the wireless context, present research has focused on security challenges at various
network stacking levels. Dos attacks are one among the most popular serious problems …

A Network Segmentation Architecture for Flow Aggregation and DDoS Mitigation in SDN Using RAPID Flow Rules

Himanshu, K Saha, P Das, S De - Proceedings of the 25th International …, 2024 - dl.acm.org
Distributed Denial-of-Service (DDoS) attacks have always posed a major threat to networks
directly or as a cover for more sophisticated attacks. In recent years, with advances such as …

Enhancement of Security using Various Web Development Frameworks

D Goyal, P Jain, B Bhushan - Proceedings of the International …, 2020 - papers.ssrn.com
From the past analysis by various organizations, it has been observed that during the web
development phase, the developers didn't invest much of their focus on the security of the …

Détection des attaques de déni de service par une approche basée Deeplearning

B Mohammed - 2022 - dspace.univ-tebessa.dz
Les attaques par déni de service sont l'une des plus graves en cybersécurité, La diversité de
ses attaques et l'utilisation de nombreuses méthodes difficiles à détecter et même à arrêter …