A Novel DDoS Attack-aware Smart Backup Controller Placement in SDN Design

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DDoS Attack in “Cloud of Things” Environment, Software Defined Networking (SDN) and A Research on Defense Mechanisms against DDoS using SDN

The Internet of Things presents the user with a novel means of communicating with the Web world through ubiquitous object-enabled networks. While IoT is exciting on its own, the real innovation will come from combining it with cloud computing. In the new era of Internet of Things integrated with cloud computing, Distributed Denial Service of Attacks (DDoS) is growing substantially. With the adv...

متن کامل

Anomaly Based DDoS Attack Detection Mechanism using SDN in Cloud computing

: Cloud computing has recently came into view as a new paradigm for hosting and delivering services over the Internet. Cloud computing is captivating to business owners as it eliminates the requirement for users to plan ahead for providing, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. Meanwhile, Software Defined Networking (S...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

A Novel Distributed Detection Scheme against DDoS Attack

A novel detection scheme against DDoS attack is proposed from a distributed perspective. The distributed end-hosts in the Internet are organized into a P2P network by Chord protocol for detection. The detection algorithm based on CUSUM and space similarity is deployed at each node in the P2P detection network. The P2P-based detection network is adopted, which makes the scheme be able to scale t...

متن کامل

A Novel Protocol for IP Traceback to Detect DDoS Attack

Distributed Denial of Service (DDoS) attacks continue to pose higher threats to the internet. There are so many protocols designed to trace the attacker‟s address. We want to trace back attack source (i.e., “IP addresses”), we need to examine the tradeoff between different existing IP Trace back techniques. We developed a Novel protocol to trace the IP address of DDoS attack. The novel protocol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Annals of Emerging Technologies in Computing

سال: 2020

ISSN: 2516-029X,2516-0281

DOI: 10.33166/aetic.2020.05.005