Distributed denial of service (DDoS) mitigation using blockchain—A comprehensive insight
S Wani, M Imthiyas, H Almohamedh, KM Alhamed… - Symmetry, 2021 - mdpi.com
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate
requests on any network. Although the first DDoS attack was reported in 1996, the …
requests on any network. Although the first DDoS attack was reported in 1996, the …
Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy
Software-defined network (SDN) plays a dominant role in meeting today's business
requirements with its ingrained features like programmability, agility, and central …
requirements with its ingrained features like programmability, agility, and central …
Service separation assisted DDoS attack mitigation in cloud targets
DDoS (Distributed denial of service) attacks target on the availability of the victim services.
DDoS attacks, being resource intensive attacks, create a heavy resource contention. In the …
DDoS attacks, being resource intensive attacks, create a heavy resource contention. In the …
Bungee-ml: A cross-plane approach for a collaborative defense against ddos attacks
LA Quintero González, L Castanheira… - Journal of Network and …, 2023 - Springer
Network services and applications are targeted by different types of attacks on a daily basis.
One of the most common and devastating types is Distributed Denial of Service (DDoS) …
One of the most common and devastating types is Distributed Denial of Service (DDoS) …
Bungee: An adaptive pushback mechanism for ddos detection and mitigation in p4 data planes
LAQ González, L Castanheira… - 2021 IFIP/IEEE …, 2021 - ieeexplore.ieee.org
A DDoS attack aims for resource exhaustion and directly impacts the availability of servers in
a network infrastructure. Although significant efforts have been made to detect and mitigate …
a network infrastructure. Although significant efforts have been made to detect and mitigate …
A resilient network node for the industrial Internet of Things
L Jäger, D Lorych, M Eckel - … of the 17th International Conference on …, 2022 - dl.acm.org
The Industrial Internet of Things (IIoT) is a ubiquitous part of modern production processes.
This introduces new challenges to classical security architectures for industrial networks like …
This introduces new challenges to classical security architectures for industrial networks like …
TSN Gatekeeper: Enforcing stream reservations via P4-based in-network filtering
Real-time communication is crucial for mission critical scenarios, such as industrial
automation and automotive applications. To meet these applications' strict quality of service …
automation and automotive applications. To meet these applications' strict quality of service …
A review of methods to prevent DDOS attacks using NFV and SDN
Denial-of-service attacks are always one of the most widespread security attacks at the
enterprise network level. In DDOS attacks, a large amount of false demand is intentionally …
enterprise network level. In DDOS attacks, a large amount of false demand is intentionally …
A Method for DDoS Attacks Prevention Using SDN and NFV
Distributed Denial-of-Service (DDoS) attacks are among the most common security attacks
in enterprise networks. DDoS attacks are designed to disrupt networks by sending many …
in enterprise networks. DDoS attacks are designed to disrupt networks by sending many …
Detecting Distributed Denial of Service Attacks in Software Defined Network Controllers: Proposed Research
EA Kunna, MN Omar… - 2024 7th International …, 2024 - ieeexplore.ieee.org
This paper addresses the security vulnerabilities in Software Defined Networking (SDN),
which separates the network control plane from the data plane. A significant concern is the …
which separates the network control plane from the data plane. A significant concern is the …