2020 International Conference on Smart Electronics and Communication (ICOSEC) 2020
DOI: 10.1109/icosec49089.2020.9215381
|View full text |Cite
|
Sign up to set email alerts
|

DPLPLN: Detection and Prevention from Flooding Attack in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Then, SDHoneyNet deploys the honey topology to mimic complex networks. In [ 4 ], the authors propose an attack detection scheme, Woodpecker, upgrading several nodes to SDN switches called SDN-enabled nodes. When the packets come into the SDN-enabled node 30 s later, the SDN-enabled node checks the statistical information over the predefined condition threshold to locate the attack.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Then, SDHoneyNet deploys the honey topology to mimic complex networks. In [ 4 ], the authors propose an attack detection scheme, Woodpecker, upgrading several nodes to SDN switches called SDN-enabled nodes. When the packets come into the SDN-enabled node 30 s later, the SDN-enabled node checks the statistical information over the predefined condition threshold to locate the attack.…”
Section: Related Workmentioning
confidence: 99%
“…The previous work focusing on mitigating LFA can be classified into two types: traffic rerouting [ 1 , 10 ] and blacklist [ 4 , 5 , 8 , 11 , 12 , 13 ]. When LFA occurs, the target links are congested continuously.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations