[go: up one dir, main page]

Sivarajan et al., 2024 - Google Patents

Attributes based access control mechanism using smart contracts against denial of service attacks in SDN

Sivarajan et al., 2024

Document ID
4524928027624847308
Author
Sivarajan E
Jeyalakshmi V
Publication year
Publication venue
AIP Conference Proceedings

External Links

Snippet

The different layers on machines handle different responsibilities, including the physical layers for mitigating the attacks and security threats at bay. Higher layers of application are protected through the physical layers of terminals with a restriction on computational and …
Continue reading at pubs.aip.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Similar Documents

Publication Publication Date Title
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
US11949656B2 (en) Network traffic inspection
US10958662B1 (en) Access proxy platform
US11457040B1 (en) Reverse TCP/IP stack
Alharbi Deployment of blockchain technology in software defined networks: A survey
Srivastava et al. Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects
Meng et al. Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration
US9979753B2 (en) Cyber-security system and methods thereof
EP3643001B1 (en) Actively monitoring encrypted traffic by inspecting logs
US20060026682A1 (en) System and method of characterizing and managing electronic traffic
US20070112957A1 (en) Systems and Methods for Remote Rogue Protocol Enforcement
US20090313682A1 (en) Enterprise Multi-interceptor Based Security and Auditing Method and Apparatus
EP3687140A2 (en) On-demand and proactive detection of application misconfiguration security threats
Anasuri Zero-Trust Architectures for Multi-Cloud Environments
Williams et al. Security aspects of internet of things–a survey
Ohri et al. Software-defined networking security challenges and solutions: A comprehensive survey
Ashraf et al. Authentication in IoT devices using blockchain technology: A review
Sivarajan et al. Attributes based access control mechanism using smart contracts against denial of service attacks in SDN
US20230254331A1 (en) Systems and methods for securing devices in a computing environment
Cherednichenko et al. Intelligent Methods of Secure Routing in Software-Defined Networks.
ALKHDOUR et al. Cybersecurity risk management in IoT systems: A systematic review
Zhou et al. [Retracted] An Adaptive Authenticated Model for Big Data Stream SAVI in SDN‐Based Data Center Networks
Chouhan et al. Software as a service: Analyzing security issues
Abd-Allah et al. A Comprehensive Survey on Security Challenges and Solutions in Software-Defined Network
Cusack et al. Defining cloud identity security and privacy issues: A Delphi method