On federated cyber range network interconnection

A Peratikou, C Louca, S Shiaeles, S Stavrou - Selected Papers from the …, 2021 - Springer
Cyber Ranges exist to enable hands on training within realistic ICT infrastructures in a
sandboxed environment, to investigate attack and defense strategies and to assess the …

Implementasi Keamanan Jalur Internet Menggunakan IP Tunneling pada OpenVPN Access Server dengan Protokol OpenVPN dan Protokol DNS Over HTTPS

Y Winawang - Jurnal Syntax Admiration, 2021 - jurnalsyntaxadmiration.com
OpenVPN access server merupakan salah satu solusi VPN yang sangat cocok diterapkan
untuk perusahaan maupun personal karena mudah dikonfigurasi dan bisa dipasang pada …

Smart collaborative contract for endogenous access control in massive machine communications

F Song, L Li, Y Ma, L Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Emerging information technologies have accelerated the construction of the Industrial
Internet of Things (IIoT). Unfortunately, the explosive growth of various services has caused …

Feasibility of Network-layer Anonymity Protocols at Terabit Speeds using a Programmable Switch

Y Yoshinaka, J Takemasa, Y Koizumi… - 2022 IEEE 8th …, 2022 - ieeexplore.ieee.org
The paper presents a Tbps-class anonymity router that supports both an anonymity protocol
and IP by leveraging a programmable switch. The key design issue is to place both the …

SDNDefender: a comprehensive DDoS defense mechanism using hybrid approaches over software defined networking

T Yu, L Rui, X Qiu - Security and Communication Networks, 2021 - Wiley Online Library
In traditional networks, DDoS attacks are often launched in the network layer or the transport
layer. Researchers had explored this problem in depth and put forward plenty of solutions …

Multi-domain network infrastructure based on P4 programmable devices for Digital Data Marketplaces

S Shakeri, L Veen, P Grosso - Cluster Computing, 2022 - Springer
There are many organizations interested in sharing data with others, and they can do this
only if a multi-domain secure platform is available. Such platforms, often referred to as …

IPsec cryptography for data packets security within vpn tunneling networks communications

KF Mahmmod, MM Azeez… - … Conference on Electrical …, 2020 - ieeexplore.ieee.org
The internet today allows us to communicate with anyone from anywhere in the world. This
kind of access is available to legitimate as well as illegitimate users. Therefore, data security …

[PDF][PDF] A Decrease in the Encryption Latency Utilizing Transport Layer Protocols for Software Defined Networks

M Saddheer, W Ahmad, M Nadeem, SW Zahra… - 2023 - researchgate.net
Data centers and business networks are rapidly using SDN (Software Defined Networking),
an emerging technology. It isolates the control plane from the underlying data or forwarding …

SFP: Service function chain provision on programmable switches for cloud tenants

H Huang, W Wu, Y He, Z Guo - 2022 IEEE International Parallel …, 2022 - ieeexplore.ieee.org
Recent progress in programmable switches provides opportunities for service function
chains (SFCs) provision to cloud tenants, which has the advantage of flexible deployment …

Running P4 Programs on General Programmable Network Interconnection Chips

CYF Lu, Z Tang, W Peng, G Lv… - 2023 Fourth International …, 2023 - ieeexplore.ieee.org
Programming protocol-independent packet processors (P4) is currently the most widespread
data plane programming language. It allows programmer to specify how data plane process …