2019
DOI: 10.1007/s11036-019-01389-2
|View full text |Cite
|
Sign up to set email alerts
|

SDNFV Based Threat Monitoring and Security Framework for Multi-Access Edge Computing Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 40 publications
0
18
0
Order By: Relevance
“…In the decision making approach, the probability of attack is identified using an Improved Support Vector Machine (ISVM) based classification technique and the training data is obtained from the samples given in [28]. The training data comprises of a binary labeled data which indicates attack probability of with both low and high chances for attack.…”
Section: Decision Making Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…In the decision making approach, the probability of attack is identified using an Improved Support Vector Machine (ISVM) based classification technique and the training data is obtained from the samples given in [28]. The training data comprises of a binary labeled data which indicates attack probability of with both low and high chances for attack.…”
Section: Decision Making Approachmentioning
confidence: 99%
“…Hence, to protect the network, a light weight security mechanism has to be applied and, thereby the Intrusion Detection System (IDS) acts as a protective wall in securing the WSN. The IDS helps to identify the misbehaving sensor nodes, which violates the security mechanism and notify the report to the administrator for further countermeasures [28]. However, most of the IDS system works only on a particular type of attack (i.e.)…”
Section: Introductionmentioning
confidence: 99%
“…In [32] a new approach to network threats utilizing three pillars of 5G is proposed. It integrates multi-layer collective security intelligence to a converged SDN/NFV architecture in standard MEC technology.…”
Section: Introductionmentioning
confidence: 99%
“…However, there are some challenges in the distributed control structure of SDN-enable MEC architecture, such as DDoS attacks [3][4][5] and load balancing [6][7][8]. In wireless networks, the peer-to-peer quality of service in the network needs to be optimized [9] and control plane scalability of distributed networks [10].…”
Section: Introductionmentioning
confidence: 99%