Malicious attack detection approach in cloud computing using machine learning techniques

M Arunkumar, K Ashok Kumar - Soft Computing, 2022 - Springer
The increasing development of decentralized computer systems that interact extensively has
increased the criticality of confronting cyberattackers, hackers, and terrorists. With the …

Mitigation services on SDN for distributed denial of service and denial of service attacks using machine learning techniques

J Ramprasath, N Krishnaraj… - IETE Journal of …, 2024 - Taylor & Francis
Software-Defined Networking (SDN) offers an innovative model over the separation of the
data plane, control plane and management plane. This separation would result in more …

Secure access of resources in software‐defined networks using dynamic access control list

J Ramprasath, V Seethalakshmi - International Journal of …, 2021 - Wiley Online Library
Software‐defined networking (SDN) creates a platform to dynamically configure the
networks for on‐demand services. SDN can easily control the data plane and the control …

Exact solutions of VNE: A survey

H Cao, L Yang, Z Liu, M Wu - China communications, 2016 - ieeexplore.ieee.org
Network virtualization is an enabling technology of running multiple virtual networks on a
shared substrate network. It aims to deal with the ossification of current network architecture …

A load-balanced re-embedding scheme for wireless network virtualization

Y Li, Z Zhang, S Xia, HH Chen - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In wireless network virtualization processes, load imbalance in substrate nodes and
substrate links may significantly reduce the number of virtual network requests served by a …

Mitigation of malicious flooding in software defined networks using dynamic access control list

J Ramprasath, V Seethalakshmi - Wireless Personal Communications, 2021 - Springer
Software defined networks (SDN) creates an environment for designing customized
networks based on consumer needs. SDN can effectively apply the decoupling methods on …

Lifetime-priority-driven resource allocation for WNV-based internet of things

Y Li, S Xia, Q Yang, G Wang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Resources allocation efficiently of wireless network virtualization (WNV) in Internet of Things
(IoT) has become a key challenge owing to the conflict between the limited capacity of …

[PDF][PDF] A survey on virtual network embedding in cloud computing centers

X Wei, S Hu, H Li, F Yang, Y Jin - The Open Automation and …, 2014 - benthamopen.com
Bridging virtualized environments with physical environments, virtual network plays an
important role in Cloud Computing infrastructures. How to allocate physical resources for …

Cost-minimized computation offloading of online multifunction services in collaborative edge-cloud networks

C Feng, P Han, X Zhang, Q Zhang… - … on Network and …, 2022 - ieeexplore.ieee.org
Cloud Computing (CC) is powerful for the computation offloading of services, promoting the
implementation of various modern applications. Mobile Edge Computing (MEC) can provide …

Software defined network-based edge cloud resource allocation framework

FA Zaman, A Jarray, A Karmouch - IEEE Access, 2019 - ieeexplore.ieee.org
A growing number of user applications rely on the computing resources of edge cloud data
centers (ECDCs). The efficient management of ECDC resources has a positive impact on …