2017
DOI: 10.1016/j.jnca.2016.04.013
|View full text |Cite
|
Sign up to set email alerts
|

Robust dynamic network traffic partitioning against malicious attacks

Abstract: The continual growth of network traffic rates results in heavy traffic processing overloads, and a typical solution is to partition traffic into multiple network processors for parallel processing especially in software-defined networks. This paper proposes an efficient and robust network traffic partitioning scheme called DTP-ICM, which dynamically distributes packet traffic with flow granularity, and assigns a new flow to a network processor with the lightest traffic load level. The scheme is first improved … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
36
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(36 citation statements)
references
References 27 publications
0
36
0
Order By: Relevance
“…This model generates the score for every input feature taking into account both current input timesteps and previous timesteps. The score formula is given in Equation (11).…”
Section: F I G U R E 7 Block Chart Of the Bilstmmentioning
confidence: 99%
See 1 more Smart Citation
“…This model generates the score for every input feature taking into account both current input timesteps and previous timesteps. The score formula is given in Equation (11).…”
Section: F I G U R E 7 Block Chart Of the Bilstmmentioning
confidence: 99%
“…In traditional machine learning models like autoregressive (AR) models or exponential smoothing-feature engineering is rendered dynamically and a part of parameters are fine-tuned. [11][12][13][14] Moreover taking into account the demesne facts, deep learning models learn highlights and evolution straightforwardly from the data. [15][16][17] They accelerate the mode of data preparation and can study more intricate data patterns in a replete manner.…”
mentioning
confidence: 99%
“…Authors in [5], [19], [20] explored whether graph mining techniques can help to uncover such macroscopic coordinated events in darknet traffic. The darknet traffic is getting complex daily, and malicious activities such as physical threats, sales data theft, fraudulent activity, phishing attacks, and scams, DDoS attacks, illicit links, Illicit Drugs, and terrorism vary day by day [21], [22], [23], [24].…”
Section: Introductionmentioning
confidence: 99%
“…[36][37][38][39][40][41][42][43][44][45] EPCM particles consist of a solid shell that does not change phase and a PCM core that can be melted and solidified. [46][47][48][49][50][51][52][53][54][55][56] The shell has a great effect on the morphological, mechanical, and thermal properties of EPCM. Moreover, PCMs can be classified as organic, inorganic, and organic-inorganic hybrid materials.…”
Section: Introductionmentioning
confidence: 99%