Anomaly and intrusion detection using deep learning for software-defined networks: A survey
Abstract Software-Defined Networks (SDN) represent an adaptable paradigm for dealing
with network users' dynamic demands. Confidentiality, integrity, and availability are …
with network users' dynamic demands. Confidentiality, integrity, and availability are …
Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI and MTD Approaches to Security Solutions
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed
network management significantly. By integrating data and control, SDN offers unparalleled …
network management significantly. By integrating data and control, SDN offers unparalleled …
A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN)
The increasing complexity and sophistication of cyberattacks pose significant challenges to
traditional network security tools. Software-defined networking (SDN) has emerged as a …
traditional network security tools. Software-defined networking (SDN) has emerged as a …
Poisoning the well: Adversarial poisoning on ML-based software-defined network intrusion detection systems
With the usage of Machine Learning (ML) algorithms in modern-day Network Intrusion
Detection Systems (NIDS), contemporary network communications are efficiently protected …
Detection Systems (NIDS), contemporary network communications are efficiently protected …
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Cyberattacks have given rise to several phenomena and have raised concerns among users
and power system operators. When they are built to bypass state estimation bad data …
and power system operators. When they are built to bypass state estimation bad data …
ERT-EDR: Online defense framework for TCP-targeted LDoS attacks in SDN
Low-rate denial of service (LDoS) attacks are a variant of denial of service (DoS) attacks that
render target services unreachable for legitimate users at a lower cost. Unlike legacy …
render target services unreachable for legitimate users at a lower cost. Unlike legacy …
DDPG-SDPCR: A DDPG-based Software Defined Perimeter Components Redeployment
Z Zhang, Q Ren, J Lu, Y Hu, H Chen - KSII Transactions on Internet …, 2024 - koreascience.kr
In wide area SDP networks, the failure of SDP components caused by malicious attacks will
be accompanied by different deployment locations, profoundly affecting network service …
be accompanied by different deployment locations, profoundly affecting network service …
Advances in the Security of SDNs: Exploration of Recent ML-Based Approaches
I Mellal, AA Wakrime, K Boukir - … on Smart Applications and Data Analysis, 2024 - Springer
In contrast to conventional networks, Software-Defined Networking has revolutionized
network control by separating data and control layers, introducing a dynamic and …
network control by separating data and control layers, introducing a dynamic and …
Integrasi Deep Packet Inspection dengan Intrusion Detection System (IDS) untuk Identifikasi Serangan DDoS dalam Jaringan Skala Besar
Perkembangan teknologi jaringan yang pesat menghadirkan tantangan baru dalam
keamanan siber, terutama dalam mendeteksi dan mencegah serangan Distributed Denial of …
keamanan siber, terutama dalam mendeteksi dan mencegah serangan Distributed Denial of …
[PDF][PDF] ОЦІНКА ВПЛИВУ АТАК В ПРОГРАМНО-КЕРОВАНИХ МЕРЕЖАХ
МО Алєксєєв, ВВ Сінько… - ВЧЕНІ …, 2024 - tech.vernadskyjournals.in.ua
Зростаюча складність кіберзагроз та постійні зміни технологій вимагають подальшого
розвитку і вдосконалення інформаційної безпеки програмно-керованої мережі. Тому …
розвитку і вдосконалення інформаційної безпеки програмно-керованої мережі. Тому …