An information security engineering framework for modeling packet filtering firewall using neutrosophic petri nets

JK Madhloom, ZH Noori, SK Ebis, OA Hassen… - Computers, 2023 - mdpi.com
Due to the Internet's explosive growth, network security is now a major concern; as a result,
tracking network traffic is essential for a variety of uses, including improving system …

Blockchain-Based Security Deployment and Resource Allocation in SDN-Enabled MEC System

D Zhao, D Zhang, Q Pei, L Liu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The traditional data security systems have the problems, such as poor adaptability, technical
barriers, and closed interfaces, which cannot meet the development requirements of beyond …

Detecting compromised IOT devices through XGBoost

MAA da Cruz, LR Abbade, P Lorenz… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The evolution and rapid adoption of the Internet of Things (IoT) led to a rise in the number of
attacks that target IoT environments. IoT environments are vulnerable to several attacks …

A formal model and technique to redistribute the packet filtering load in multiple firewall networks

L Durante, L Seno, A Valenzano - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The dynamic redistribution of filtering rules between firewalls, which are located in the same
network, is a technical solution that can cope with temporary changes in the traffic load …

SDWAN with IDPS Efficient Network Solution

FN Rania, JY Chan, ES Ng, JY Fong… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
The Wide Area Network and firewall are the current networking technologies that are widely
used in most enterprises. But due to the rapid development of new technologies, there is a …

Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems

SA Alavi, HP Moghadam, AH Jahangir - International Journal of Critical …, 2024 - Elsevier
This paper introduces a novel cyberattack vector called the” Autonomous Firmware Zombie
Attack.” Unlike traditional zombie attacks that rely on botnets and direct network control, this …

[HTML][HTML] Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier

Z Chen, M Simsek, B Kantarci, M Bagheri, P Djukic - Computer Networks, 2024 - Elsevier
Abstract Network Intrusion Detection Systems (NIDS) have been extensively investigated by
monitoring real network traffic and analyzing suspicious activities. However, there are …

Host-based network intrusion detection via feature flattening and two-stage collaborative classifier

Z Chen, M Simsek, B Kantarci, M Bagheri… - arXiv preprint arXiv …, 2023 - arxiv.org
Network Intrusion Detection Systems (NIDS) have been extensively investigated by
monitoring real network traffic and analyzing suspicious activities. However, there are …

SDN Architecture to prevent attacks with OpenFlow

O Flauzac, EG Robledo, C Gonzalez… - … Networks and Mobile …, 2020 - ieeexplore.ieee.org
The impact of the Internet of Things (IoT) evolves rapidly, increasing the volume of traffic,
and complicating the management of large scalable networks. Despite the security tools …

An Anomaly Free Distributed Firewall System for SDN

M Sinha, P Bera, M Satpathy - 2021 International Conference …, 2021 - ieeexplore.ieee.org
Firewall is a core element of a network security system which takes care of the availability,
privacy, and integrity of network resources. However, managing a system with large scale …