Gonzalez et al., 2023 - Google Patents
IoT Flooding Attack Defense in SDN: A Real-Data Machine Learning ApproachGonzalez et al., 2023
- Document ID
- 11590600931340010863
- Author
- Gonzalez C
- Charfadine S
- Publication year
- Publication venue
- 2023 1st International Conference on Advanced Engineering and Technologies (ICONNIC)
External Links
Snippet
Software-defined networking (SDN) has become a promising paradigm for mitigating the limitations intrinsic to legacy network architectures. By decentralizing the control logic from the underlying data-forwarding plane, SDN radically transforms the fundamental principles …
- 238000010801 machine learning 0 title abstract description 40
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Anthi et al. | A supervised intrusion detection system for smart home IoT devices | |
Lohachab et al. | Critical analysis of DDoS—An emerging security threat over IoT networks | |
Othman et al. | Survey on intrusion detection system types | |
Modi et al. | A survey of intrusion detection techniques in cloud | |
Kundu et al. | Detection and classification of botnet traffic using deep learning with model explanation | |
Chiba et al. | A survey of intrusion detection systems for cloud computing environment | |
Fernando et al. | Enhancing intrusion detection in IoT communications through ML model generalization with a new dataset (IDSAI) | |
Kumar et al. | A survey on intrusion detection systems for cloud computing environment | |
Bhatt et al. | HADS: Hybrid anomaly detection system for IoT environments | |
Mehibs et al. | Proposed network intrusion detection system based on fuzzy c mean algorithm in cloud computing environment | |
Modi et al. | A feasible approach to intrusion detection in virtual network layer of Cloud computing | |
Al Haddad et al. | A collaborative framework for intrusion detection (C-NIDS) in cloud computing | |
Singh | Securing of cloud infrastructure using enterprise honeypot | |
Mangrulkar et al. | Network attacks and their detection mechanisms: A review | |
Komisarek et al. | Modern netflow network dataset with labeled attacks and detection methods | |
Boukebous et al. | A comparative analysis of Snort 3 and Suricata | |
Ádám et al. | Artificial neural network based IDS | |
Mateus et al. | Federated learning-based solution for DDoS detection in SDN | |
Umamaheswari et al. | Impregnable Defence Architecture using Dynamic Correlation-based Graded Intrusion Detection System for Cloud. | |
Gajjar et al. | A survey of intrusion detection system (IDS) using OpenStack private cloud | |
Halman et al. | Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks. | |
Yu et al. | Detection and defense against network isolation attacks in software‐defined networks | |
Premathilaka et al. | Review on state of art intrusion detection systems designed for the cloud computing paradigm | |
Beg et al. | Feasibility of intrusion detection system with high performance computing: A survey | |
Althobiti et al. | Machine learning approach to secure software defined network: Machine learning and artificial intelligence |