2022
DOI: 10.1007/s10586-022-03666-4
|View full text |Cite
|
Sign up to set email alerts
|

TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Furthermore, TCP variants are susceptible to TCP Window Size attacks, where attackers manipulate TCP window size values to degrade network performance, disrupt communication, or exhaust available resources [156], [157]. By sending TCP packets with artificially inflated or reduced window size values, attackers can force the target's TCP stack to allocate excessive memory or processing resources, leading to performance degradation or denial of service [158].…”
Section: Common Attacks In Tcpmentioning
confidence: 99%
“…Furthermore, TCP variants are susceptible to TCP Window Size attacks, where attackers manipulate TCP window size values to degrade network performance, disrupt communication, or exhaust available resources [156], [157]. By sending TCP packets with artificially inflated or reduced window size values, attackers can force the target's TCP stack to allocate excessive memory or processing resources, leading to performance degradation or denial of service [158].…”
Section: Common Attacks In Tcpmentioning
confidence: 99%
“…In light of the aforementioned limitations, future research should aim at developing more robust machine learning algorithms capable of real-time learning. Such evolution would enhance the system's responsiveness to immediate network conditions, thus improving reliability [62].…”
Section: Future Directionsmentioning
confidence: 99%
“…In comparison to our paper, which focuses on defending against packet injection attacks using deep learning, Sudar et al [23] explore the vulnerability of SDN to different types of attacks. While our paper aims to develop novel solutions for defending against packet injection attacks, the work of Sudar et al demonstrates the need for investigating the resilience of SDN against security attacks and suggests the importance of hardening the technology to provide a secure network environment.…”
Section: Packet Injection Attacks On Sdnmentioning
confidence: 99%