2010 IEEE 12th International Conference on Communication Technology 2010
DOI: 10.1109/icct.2010.5689156
|View full text |Cite
|
Sign up to set email alerts
|

A novel design for future on-demand service and security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(23 citation statements)
references
References 9 publications
0
21
0
Order By: Relevance
“…Such a mechanism was introduced in YuHunag et al [6] where the detection loop consists of two stages. If the total number of the received packets exceeds 3000 packets per second, the system will move onto the next stage which the incoming packets will be dropped when the total number of the received is equal or higher than 800 packets per second for 5 times continuously.…”
Section: Introductionmentioning
confidence: 99%
“…Such a mechanism was introduced in YuHunag et al [6] where the detection loop consists of two stages. If the total number of the received packets exceeds 3000 packets per second, the system will move onto the next stage which the incoming packets will be dropped when the total number of the received is equal or higher than 800 packets per second for 5 times continuously.…”
Section: Introductionmentioning
confidence: 99%
“…In [39] the authours propose the framework "Reverberation" that gives dynamically control approaches. Their answer depends on OpenManaged to realize dynamically control in system components.…”
Section: Security and Network Access Controlmentioning
confidence: 99%
“…The example of such system is introduced by Junho Suh et.al in [115] that is implemented on NetFPGA-OF platform. Chu et al in [116] introduced system which uses OF switch on edge to pass only safe traffic which is defined on flow table and LISP (Locator/ID separation protocol) to recognize trusty user In [117] have been explored solutions for scanning-based attack. In that article J. Jafarian et.al introduced OF Random Host Mutation (OFRHM) system which changes real IP of each host with the random virtual IP.…”
Section: Securitymentioning
confidence: 99%