472 Hits in 4.3 sec

An Optimization Routing Algorithm Based on Segment Routing in Software-Defined Networks

Xiaolan Hou, Muqing Wu, Min Zhao
2018 Sensors  
The combination of SR and SDN can meet the differentiated business needs of users and can quickly deploy applications. In this paper, we propose two routing algorithms based on SR in SDN.  ...  Segment routing (SR) exploits an end-to-end logical path and is composed of a sequence of segments as an effective routing strategy. Each segment is represented by a middle point.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19010049 fatcat:c46la5y6afg5fgcp3bn3kcnu5y

SDNDefender: A Comprehensive DDoS Defense Mechanism Using Hybrid Approaches over Software Defined Networking

Tianfang Yu, Lanlan Rui, Xuesong Qiu, Weizhi Meng
2021 Security and Communication Networks  
However, these solutions are only suitable for scenarios such as a single link or victim side network and could not analyse traffic distribution from the angle of the global network.  ...  In this paper, we adopt a combination of diverse technologies to design SDNDefender, a SDN-based DDoS detection and defense mechanism, which is composed of two core components aiming to counter the most  ...  [15] presents DDAH, a host-based dynamic detection method for IP spoofing in SDN. DDAH uses access ports to find anomaly hosts and periodically calculates their weight and activity.  ... 
doi:10.1155/2021/5097267 fatcat:enyunk2tcbbsnpslelostqfeue

Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment

Sehrish Batool, Farrukh Zeeshan Khan, Syed Qaiser Ali Shah, Muneer Ahmed, Roobaea Alroobaea, Abdullah M. Baqasah, Ihsan Ali, Muhammad Ahsan Raza, Muhammad Arif
2022 Security and Communication Networks  
The proposed algorithm uses a three-phased detection scheme to minimize the false-positive rate. Entropy, standard deviation, and weighted moving average have been used for intrusion detection.  ...  In this research, software-defined networking (SDN) has been suggested as a solution to fight DDoS attacks.  ...  For entropy calculation, we have used the destination IP of the sending device, and it will be calculated in a fixed window size of 50. e threshold value for entropy is 1. e algorithm for the proposed  ... 
doi:10.1155/2022/2593672 fatcat:gazvtl7jtndjjgy5bdul2svbqe

RCP: A Temporal Clustering Algorithm for Real-time Controller Placement in Mobile SDN Systems [article]

Reza Soleymanifar, Carolyn Beck
2021 arXiv   pre-print
The Controller Placement (CP) problem in SDN, which is typically subject to specific optimality criteria, is one of the primary problems in the design of SDN systems.  ...  We compare our work with a frame-by-frame approach and demonstrate its superiority, both in terms of speed and incurred cost, via simulations.  ...  Hey- lationships of the network dynamics in order to efficiently wood, “A genetic algorithm for dynamic controller placement in adapt placement solutions in real-time.  ... 
arXiv:2112.03037v1 fatcat:7z6jmz35dzbura2ktefhtjfdby

Load Balancing in Software Defined Networking: A Review

Prabhjot Kaur, Jasmeen Kaur Chahal, Abhinav Bhandari
2018 Asian Journal of Computer Science and Technology  
SDN (Software Defined Networking) is a strategy for making, planning and overseeing systems which intend to change this present unfortunate circumstance.  ...  In this survey paper, we've reviewed the concept of (SDNs) Software Defined Networks, its architecture and applications.  ...  Weighted Entropy and Hits 8 Control Link Load Balancing and Low Delay Route Deployment for Software Defined Networks (2017) [16] MCSF depends on the algorithm for the CLB issue and a turning  ... 
doi:10.51983/ajcst-2018.7.2.1859 fatcat:zkgp7cc23bgp7jjznsvxi73w5q

A Defense Mechanism of Random Routing Mutation in SDN

Jiang LIU, Hongqi ZHANG, Zhencheng GUO
2017 IEICE transactions on information and systems  
normal communication in an SDN network.  ...  Random routing mutation is triggered according to the result of network anomaly detection, which using a wavelet transform and principal component analysis to handle the above entropy matrix for both spatial  ...  Therefore, this paper proposes a Random Routing Mutation (RRM) method by referencing the idea of MTD and taking advantage of the global network view and centralized control in SDN.  ... 
doi:10.1587/transinf.2016edp7377 fatcat:sdtmjspsmzhmfkwkqlbhaymche

Field trial of Machine-Learning-assisted and SDN-based Optical Network Planning with Network-Scale Monitoring Database

Shuangyi Yan, Faisal Nadeem Khan, Alex Mavromatis, Dimitrios Gkounis, Qirui Fan, Foteini Ntavou, Konstantinos Nikolovgenis, Fanchao Meng, Emilio Hugues Salas, Changjian Guo, Chao Lu, Alan Pak Tao Lau (+2 others)
2017 2017 European Conference on Optical Communication (ECOC)  
The SDN controller leverages the path computation application to calculate a suitable path for the user request and then finds a set of available wavelengths for the transmission.  ...  A developed SDN controller dynamically monitors and configures the data plane.  ... 
doi:10.1109/ecoc.2017.8346091 fatcat:sbzvqnmmmfc4rllphahcadrbsi

AI-aided Traffic Differentiated QoS Routing and Dynamic Offloading in Distributed Fragmentation Optimized SDN-IoT

Muhamed Begović, Samir Čaušević, Belma Memić, Adisa Hasković
2020 International journal of engineering research and technology  
In this paper, we address this issue by proposing a seamless model of AI-aided Traffic Differentiated QoS Routing and Dynamic Offloading in distributed fragmentation optimized SDN-IoT.  ...  The poor QoS is often caused by load imbalance in controllers and switches. To overwhelm this issue, we propose a Dynamic Offloading scheme in SD-IoT.  ...  [20] proposed a QoS-aware traffic classification method in SDN by DPI. A semi-supervised machine learning algorithm is combined with DPI for SDN.  ... 
doi:10.37624/ijert/13.8.2020.1880-1895 fatcat:lhfkqfb6f5fepll2pqq22uqhwe

A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network

2018 KSII Transactions on Internet and Information Systems  
It is convenient to build the Traffic Matrix from a global view in SDN. However, the monitoring and management of high-volume feature-rich traffic in large networks brings significant challenges.  ...  In this paper, we propose a moving window Principal Components Analysis based anomaly detection and mitigation approach to map data onto a low-dimensional subspace and keep monitoring the network state  ...  Q statistic method is a procedure for testing the residual vector, which is obtained according to PCA method, associated with a single observation vector and for an overall test for a group of observations  ... 
doi:10.3837/tiis.2018.08.022 fatcat:syqxbifhwndufnkdpeot3w7bqe

S-DPS: An SDN-Based DDoS Protection System for Smart Grids

Hassan Mahmood, Danish Mahmood, Qaisar Shaheen, Rizwan Akhtar, Wang Changda, Shehzad Chaudhry
2021 Security and Communication Networks  
Moreover, the employment of a dynamic threshold mechanism is making detection process adaptive to the changing network conditions.  ...  The proposed approach, i.e., Software Defined Networking-based DDoS Protection System (S-DPS), is efficiently addressing these issues by employing light-weight Tsallis entropy-based defense mechanisms  ...  Acknowledgments is work was partially supported by the Natural Science Foundation of China (NSFC) under grant no. 62072217.  ... 
doi:10.1155/2021/6629098 fatcat:b5pxdot5mnelphz6iqynl2uksq

A Trusted Resource-based Routing Algorithm with Entropy Estimation in Integrated Space-Terrestrial Network

Kun Guo, Dongbin Wang, Hui Zhi, Yueming Lu, Zhengang Jiao
2020 IEEE Access  
In the process, the SDN controller constructs the characteristic matrices by collecting the state information of each routing node and the entropy estimation method which describes the changes of traffic  ...  Integrated Space-Terrestrial Network (ISTN) can effectively improve the global communication coverage and SDN framework in ISTN has emerged as a promising solution to guarantee the Quality of Service (  ...  , service connection times monitored by each routing node, and obtained the dynamic change information of the characteristic entropy.  ... 
doi:10.1109/access.2020.3007218 fatcat:klzrhh7pkzcxbc6r6q43brpvra

Identifying Hybrid DDoS Attacks in Deterministic Machine-to-Machine Networks on a Per-Deterministic-Flow Basis

Yen-Hung Chen, Yuan-Cheng Lai, Kai-Zhong Zhou
2021 Micromachines  
Furthermore, the contribution of this study is to deploy the FDD in the SDN controller OpenDayLight to implement a Hybrid DDoS attack detection system.  ...  The FDD first applies a fuzzy-based mechanism, Target Link Selection, to determine the most valuable links for the DDoS link/server attacker and then statistically evaluates the traffic pattern flowing  ...  The TSM is responsible for calculating which links will be selected as target links. It also calculates the link weight using Formula (1) in [21] .  ... 
doi:10.3390/mi12091019 pmid:34577663 fatcat:u34be2il7jc3pgwbgf7garcy5q

A Deep Learning method for effective channel allotment for SDN based IOT

Shilpa P Khedkar, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
Doing proper assignment of appropriate channels to the generated traffic in SDN based IoT can affect transmission speed enormously.  ...  Different machine learning algorithm can be used for prediction of network traffic and allocation of the channel is done for better assignment.  ...  This dynamic accommodation is a critical issue for the speedy allocation of the channels to dynamic traffic over IoT.  ... 
doi:10.17762/turcomat.v12i2.1508 fatcat:znrywmkkbfbcjab4kdlvybg72i

Multicriteria Handover Management by the SDN Controller-based Fussy AHP and VIKOR Methods

Najib Mouhassine, Mostapha Badri, Mohamed Moughit
2021 International Journal of Advanced Computer Science and Applications  
Therefore, to guide the Horizontal handover process in wireless networks towards making a better choice for VoIP in congested environments, we propose the integration of the Fuzzy-AHP and VIKOR method  ...  A wireless environment is characterized by its dynamic nature, inherent uncertainty, and imprecise parameters and constraints.  ...  To reflect the importance of the attributes, they are assigned a weighting factor either by the decision-maker or calculated with a mathematical method.  ... 
doi:10.14569/ijacsa.2021.0120753 fatcat:bikr4xn4tfawzkg4t626eeextm

OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

Biao Han, Xiangrui Yang, Zhigang Sun, Jinfeng Huang, Jinshu Su
2018 Security and Communication Networks  
Distributed Denial of Service (DDoS) attacks are one of the biggest concerns for security professionals.  ...  We propose a novel defense strategy offloading mechanism to dynamically deploy defense applications across the controller and switches, by which rapid attack reaction and accurate botnet location can be  ...  Acknowledgments This research was supported in part by Chinese National Programs for High Technology Research and Development  ... 
doi:10.1155/2018/9649643 fatcat:jo3ezd5q5zd57fv7moksggmkqm
« Previous Showing results 1 — 15 out of 472 results