DDoS attack detection and mitigation using SDN: methods, practices, and solutions

NZ Bawany, JA Shamsi, K Salah - Arabian Journal for Science and …, 2017 - Springer
Distributed denial-of-service (DDoS) attacks have become a weapon of choice for hackers,
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …

Progress and challenges in intelligent vehicle area networks

M Faezipour, M Nourani, A Saeed… - Communications of the …, 2012 - dl.acm.org
Progress and challenges in intelligent vehicle area networks Page 1 90 coMMunicaTions of
The acM | FeBRuARY 2012 | VoL. 55 | No. 2 review articles MUCh attentiOn haS recently …

Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments

K Giotis, C Argyropoulos, G Androulidakis… - Computer Networks, 2014 - Elsevier
Abstract Software Defined Networks (SDNs) based on the OpenFlow (OF) protocol export
control-plane programmability of switched substrates. As a result, rich functionality in traffic …

Payless: A low cost network monitoring framework for software defined networks

SR Chowdhury, MF Bari, R Ahmed… - 2014 IEEE Network …, 2014 - ieeexplore.ieee.org
Software Defined Networking promises to simplify network management tasks by separating
the control plane (a central controller) from the data plane (switches). OpenFlow has …

Unsupervised network intrusion detection systems: Detecting the unknown without knowledge

P Casas, J Mazel, P Owezarski - Computer Communications, 2012 - Elsevier
Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized
signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic …

A review of detection approaches for distributed denial of service attacks

P Kaur, M Kumar, A Bhandari - Systems Science & Control …, 2017 - Taylor & Francis
ABSTRACT Distributed Denial of Service (DDoS) attacks are the intimidation trials on the
Internet that depletes the network bandwidth or exhausts the victim's resources …

Information fusion to defend intentional attack in internet of things

PY Chen, SM Cheng, KC Chen - IEEE Internet of Things journal, 2014 - ieeexplore.ieee.org
Robust network design against attacks is one of the most fundamental issues in Internet of
Things (IoT) architecture as IoT operations highly rely on the support of the underlaying …

Multiagent/multiobjective interaction game system for service provisioning in vehicular cloud

M Aloqaily, B Kantarci, HT Mouftah - Ieee Access, 2016 - ieeexplore.ieee.org
The increasing number of applications based on the Internet of Things, as well as advances
in wireless communication, information and communication technology, and mobile cloud …

Information fusion for computer security: State of the art and open issues

I Corona, G Giacinto, C Mazzariello, F Roli, C Sansone - Information Fusion, 2009 - Elsevier
In this paper, we critically review the issue of information fusion for computer security, both in
terms of problem formulation and in terms of state-of-the-art solutions. We also analyze main …

Evaluating visualization approaches to detect abnormal activities in network traffic data

SY Ji, BK Jeong, DH Jeong - International Journal of Information Security, 2021 - Springer
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …