Validating User Flows to Protect Software Defined Network Environments

Por um escritor misterioso
Last updated 24 janeiro 2025
Validating User Flows to Protect Software Defined Network Environments
Software Defined Network is a promising network paradigm which has led to several security threats in SDN applications that involve user flows, switches, and controllers in the network. Threats as spoofing, tampering, information disclosure, Denial of Service, flow table overloading, and so on have been addressed by many researchers. In this paper, we present novel SDN design to solve three security threats: flow table overloading is solved by constructing a star topology-based architecture, unsupervised hashing method mitigates link spoofing attack, and fuzzy classifier combined with L1-ELM running on a neural network for isolating anomaly packets from normal packets. For effective flow migration Discrete-Time Finite-State Markov Chain model is applied. Extensive simulations using OMNeT++ demonstrate the performance of our proposed approach, which is better at preserving holding time than are other state-of-the-art works from the literature.
Validating User Flows to Protect Software Defined Network Environments
Security Services
Validating User Flows to Protect Software Defined Network Environments
PDF) Enhancing Network Security through Software Defined
Validating User Flows to Protect Software Defined Network Environments
Cisco Secure Client Data Sheet - Cisco
Validating User Flows to Protect Software Defined Network Environments
Managing multi-tenant APIs using API Gateway
Validating User Flows to Protect Software Defined Network Environments
PERM-GUARD: Authenticating the Validity of Flow Rules in Software
Validating User Flows to Protect Software Defined Network Environments
NSG flow logs overview - Azure Network Watcher
Validating User Flows to Protect Software Defined Network Environments
What Is Zero Trust Security? How to Implement It & More
Validating User Flows to Protect Software Defined Network Environments
What is Certificate-Based Authentication - Yubico
Validating User Flows to Protect Software Defined Network Environments
Validating User Flows to Protect Software Defined Network Environments
Validating User Flows to Protect Software Defined Network Environments
Continuous integration: code, deliverables and environments
Validating User Flows to Protect Software Defined Network Environments
PDF) Validating User Flows to Protect Software Defined Network
Validating User Flows to Protect Software Defined Network Environments
PERM-GUARD: Authenticating the Validity of Flow Rules in Software
Validating User Flows to Protect Software Defined Network Environments
Validating User Flows to Protect Software Defined Network Environments
Validating User Flows to Protect Software Defined Network Environments
PDF) Validating User Flows to Protect Software Defined Network
Validating User Flows to Protect Software Defined Network Environments
Innovax Technologies, LLC - Software Defined Perimeter (SDP) for

© 2014-2025 atsrb.gos.pk. All rights reserved.