Sivarajan et al., 2024 - Google Patents
Attributes based access control mechanism using smart contracts against denial of service attacks in SDNSivarajan et al., 2024
- Document ID
- 4524928027624847308
- Author
- Sivarajan E
- Jeyalakshmi V
- Publication year
- Publication venue
- AIP Conference Proceedings
External Links
Snippet
The different layers on machines handle different responsibilities, including the physical layers for mitigating the attacks and security threats at bay. Higher layers of application are protected through the physical layers of terminals with a restriction on computational and …
- 230000007246 mechanism 0 title description 28
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
US11949656B2 (en) | Network traffic inspection | |
US10958662B1 (en) | Access proxy platform | |
US11457040B1 (en) | Reverse TCP/IP stack | |
Alharbi | Deployment of blockchain technology in software defined networks: A survey | |
Srivastava et al. | Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects | |
Meng et al. | Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration | |
US9979753B2 (en) | Cyber-security system and methods thereof | |
EP3643001B1 (en) | Actively monitoring encrypted traffic by inspecting logs | |
US20060026682A1 (en) | System and method of characterizing and managing electronic traffic | |
US20070112957A1 (en) | Systems and Methods for Remote Rogue Protocol Enforcement | |
US20090313682A1 (en) | Enterprise Multi-interceptor Based Security and Auditing Method and Apparatus | |
EP3687140A2 (en) | On-demand and proactive detection of application misconfiguration security threats | |
Anasuri | Zero-Trust Architectures for Multi-Cloud Environments | |
Williams et al. | Security aspects of internet of things–a survey | |
Ohri et al. | Software-defined networking security challenges and solutions: A comprehensive survey | |
Ashraf et al. | Authentication in IoT devices using blockchain technology: A review | |
Sivarajan et al. | Attributes based access control mechanism using smart contracts against denial of service attacks in SDN | |
US20230254331A1 (en) | Systems and methods for securing devices in a computing environment | |
Cherednichenko et al. | Intelligent Methods of Secure Routing in Software-Defined Networks. | |
ALKHDOUR et al. | Cybersecurity risk management in IoT systems: A systematic review | |
Zhou et al. | [Retracted] An Adaptive Authenticated Model for Big Data Stream SAVI in SDN‐Based Data Center Networks | |
Chouhan et al. | Software as a service: Analyzing security issues | |
Abd-Allah et al. | A Comprehensive Survey on Security Challenges and Solutions in Software-Defined Network | |
Cusack et al. | Defining cloud identity security and privacy issues: A Delphi method |