2021
DOI: 10.32604/cmc.2021.016591
|View full text |Cite
|
Sign up to set email alerts
|

Automated Controller Placement for Software-Defined Networks to Resist DDoS Attacks

Abstract: the model is useful in planning for SDN reliability in the presence of DDoS attacks while managing the overall cost.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 55 publications
0
1
0
Order By: Relevance
“…Automation: Machine learning can automate the detection and mitigation of DDoS and Delay attacks, allowing security teams to respond quickly and effectively [3]. This can reduce the impact of an attack and prevent data loss or service disruptions.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…Automation: Machine learning can automate the detection and mitigation of DDoS and Delay attacks, allowing security teams to respond quickly and effectively [3]. This can reduce the impact of an attack and prevent data loss or service disruptions.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…They discussed the latest research on medical data utilizing this technology, as well as several potential medical use cases in which this technology might play a key part in streamlining the process. They've also presented a networking protocol based IoMT delivery system [23].…”
Section: Literature Studymentioning
confidence: 99%
“…The data captured and processed within the IoT network is of a sensitive nature that demands security from possible intrusions. Different security mechanisms such as firewalls, authentication schemes, different encryption methods, antiviruses, etc., are currently used to protect sensitive data from possible security attacks [12][13][14] on vulnerable devices [15][16][17] like the distributed denial of service (DDoS) attacks [18][19][20][21] as the first line of defense. IoT can implement using software-defined networking [SDN] [22][23][24], future network architecture [25][26][27][28], named data networking (NDN) [29][30][31] and cloud computing network [32] with voice over IP (VoIP) [33][34][35][36] fiber optics [37][38][39], worldwide interoperability for microwave access (WiMAX) [40][41][42], deep learning (DL) [43], artificial intelligence (AI), and machine learning (ML) [44].…”
Section: Introductionmentioning
confidence: 99%