2021
DOI: 10.1007/s11277-021-08626-6
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of Malicious Flooding in Software Defined Networks Using Dynamic Access Control List

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…SDN incorporates dynamic rewall management for secure access control, mitigation of DoS attacks and prevention of malicious tra c [177].…”
Section: Access Control In Sdnmentioning
confidence: 99%
“…SDN incorporates dynamic rewall management for secure access control, mitigation of DoS attacks and prevention of malicious tra c [177].…”
Section: Access Control In Sdnmentioning
confidence: 99%
“…Because of this, widespread adoption of the cloud is being held back by worries about security, privacy, productivity, and flexibility [20][21][22]. In this attempt, we found that the handicraft arrangements' existing state only meets a portion of the requirements that are worrying us; a comprehensive arrangement that takes into account all the competing criteria is urgently needed [23][24][25][26].…”
Section: A Related Workmentioning
confidence: 99%
“…The performance of the proposed machine learning technique for identi cation and classi cation of ooding attacks is proved by comparing it with related DoS detection techniques. J. Ramprasath and V. Seethalakshmi [41] suggested DoS attack identi cation using rule-based dynamic access control lists (RDACL) with the simulated virtual network in software-de ned networks. Figure 9 shows the comparative performance of ooding attack detection using different evaluation metrics in percentage.…”
Section: Ac = (5)mentioning
confidence: 99%