2019
DOI: 10.1016/j.jnca.2019.03.005
|View full text |Cite
|
Sign up to set email alerts
|

Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0
6

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(38 citation statements)
references
References 17 publications
0
27
0
6
Order By: Relevance
“…Birkinshaw et al [41] implemented an IDS using softwaredefined networking (SDN). The authors have targeted two types of attacks: DoS and port scanning, for which they implemented Credit-Based Threshold Random Walk (CB-TRW) and Rate Limiting (RL).…”
Section: A Cybercrime Detection Using Statistical Methodsmentioning
confidence: 99%
“…Birkinshaw et al [41] implemented an IDS using softwaredefined networking (SDN). The authors have targeted two types of attacks: DoS and port scanning, for which they implemented Credit-Based Threshold Random Walk (CB-TRW) and Rate Limiting (RL).…”
Section: A Cybercrime Detection Using Statistical Methodsmentioning
confidence: 99%
“…Most of the research projects [23], [24], [25], [2], [13] develop defending mechanism against DDoS attacks using SDN whereas, SDN architecture itself suffer from different kind of DDoS attacks. A limited number of works [9], [10], [11], [12], [14], [15] address the potential challenges to mitigate DDoS attacks in SDN.…”
Section: Related Workmentioning
confidence: 99%
“…mod 2 24 − H2 mod 2 24 As we can see above and in Table I, we calculate the two hash values H1 and H2 (based on TCP options, secret keys k1, k2 and count) then we use them with ISNs and MSS to generate the cookie (ISNd), as it is shown in (3). For the cookie validation, there are 2 integrity controls (count(cookie) and MSS(cookie)).…”
Section: System Designmentioning
confidence: 99%
See 1 more Smart Citation
“…The attacks can cause high severity and impact in most cases that even small fraction of time influencing detection and prevention need to be very concern and critical. With the intrusion and attacks, the attackers can gain access of confidential data from the victims or injecting various malware inside victim"s machine [2]. With new challenges such as sophisticated malware that has been rampaging in our network, traditional conventional solution like signature-based detection that relies on malware attack pattern does not give higher impact and less efficient in preventing malware attacks [3].…”
Section: Introductionmentioning
confidence: 99%