[go: up one dir, main page]

Gonzalez et al., 2023 - Google Patents

IoT Flooding Attack Defense in SDN: A Real-Data Machine Learning Approach

Gonzalez et al., 2023

Document ID
11590600931340010863
Author
Gonzalez C
Charfadine S
Publication year
Publication venue
2023 1st International Conference on Advanced Engineering and Technologies (ICONNIC)

External Links

Snippet

Software-defined networking (SDN) has become a promising paradigm for mitigating the limitations intrinsic to legacy network architectures. By decentralizing the control logic from the underlying data-forwarding plane, SDN radically transforms the fundamental principles …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • H04L43/026Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation

Similar Documents

Publication Publication Date Title
Anthi et al. A supervised intrusion detection system for smart home IoT devices
Lohachab et al. Critical analysis of DDoS—An emerging security threat over IoT networks
Othman et al. Survey on intrusion detection system types
Modi et al. A survey of intrusion detection techniques in cloud
Kundu et al. Detection and classification of botnet traffic using deep learning with model explanation
Chiba et al. A survey of intrusion detection systems for cloud computing environment
Fernando et al. Enhancing intrusion detection in IoT communications through ML model generalization with a new dataset (IDSAI)
Kumar et al. A survey on intrusion detection systems for cloud computing environment
Bhatt et al. HADS: Hybrid anomaly detection system for IoT environments
Mehibs et al. Proposed network intrusion detection system based on fuzzy c mean algorithm in cloud computing environment
Modi et al. A feasible approach to intrusion detection in virtual network layer of Cloud computing
Al Haddad et al. A collaborative framework for intrusion detection (C-NIDS) in cloud computing
Singh Securing of cloud infrastructure using enterprise honeypot
Mangrulkar et al. Network attacks and their detection mechanisms: A review
Komisarek et al. Modern netflow network dataset with labeled attacks and detection methods
Boukebous et al. A comparative analysis of Snort 3 and Suricata
Ádám et al. Artificial neural network based IDS
Mateus et al. Federated learning-based solution for DDoS detection in SDN
Umamaheswari et al. Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud.
Gajjar et al. A survey of intrusion detection system (IDS) using OpenStack private cloud
Halman et al. Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks.
Yu et al. Detection and defense against network isolation attacks in software‐defined networks
Premathilaka et al. Review on state of art intrusion detection systems designed for the cloud computing paradigm
Beg et al. Feasibility of intrusion detection system with high performance computing: A survey
Althobiti et al. Machine learning approach to secure software defined network: Machine learning and artificial intelligence