2017 19th International Conference on Advanced Communication Technology (ICACT) 2017
DOI: 10.23919/icact.2017.7890099
|View full text |Cite
|
Sign up to set email alerts
|

Detection as a service: An SDN application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 10 publications
1
5
0
Order By: Relevance
“…However, currently platform is tested on single workstation, the whole functionality can be installed on several VMs for load balancing and decentralized monitoring purposes in order to handle large amount of traffic at core network. The similar mechanism has been explained in other papers presented by authors on SDN security [10].…”
Section: Resultssupporting
confidence: 64%
“…However, currently platform is tested on single workstation, the whole functionality can be installed on several VMs for load balancing and decentralized monitoring purposes in order to handle large amount of traffic at core network. The similar mechanism has been explained in other papers presented by authors on SDN security [10].…”
Section: Resultssupporting
confidence: 64%
“…Software-defined networking manages networks that aim to provide dynamic, programmability, and efficient network configuration to enhance network performance and monitoring. In other work [51], the authors explore how the use of SDN technology can be utilized to improve intrusion detection technology through the concept of detection as a service (DaaS) in the SDN environment. The research focuses on how the combination of the programmability features in SDN can be combined with intrusion detection systems to make a redundant, reliable, and scalable anomaly detection system that can be used for mobile network operators.…”
Section: Intrusion Detection In Sdn For Fog and Cloud Computingmentioning
confidence: 99%
“…Moreover, once the malicious events and the entropy values of the IP address and port address (layers 1-4 attacks) are detected, the authors implemented an anomaly mitigation technique using OF to drop the corresponding malicious traffic. In an earlier study, 91 the authors introduced an intrusion detection and prevention system (IDS/IPS) in order to mitigate malicious attacks. The suspicious activity is identified by deploying IDS and IPS at all the gateway nodes so that the SDN controller may block such malicious traffic from the control flow.…”
Section: Security In Dcnmentioning
confidence: 99%