Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (60)
  • Open Access

    ARTICLE

    An Intrusion Detection System for SDN Using Machine Learning

    G. Logeswari*, S. Bose, T. Anitha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 867-880, 2023, DOI:10.32604/iasc.2023.026769

    Abstract Software Defined Networking (SDN) has emerged as a promising and exciting option for the future growth of the internet. SDN has increased the flexibility and transparency of the managed, centralized, and controlled network. On the other hand, these advantages create a more vulnerable environment with substantial risks, culminating in network difficulties, system paralysis, online banking frauds, and robberies. These issues have a significant detrimental impact on organizations, enterprises, and even economies. Accuracy, high performance, and real-time systems are necessary to achieve this goal. Using a SDN to extend intelligent machine learning methodologies in an Intrusion Detection System (IDS) has stimulated… More >

  • Open Access

    ARTICLE

    An Optimal Framework for SDN Based on Deep Neural Network

    Abdallah Abdallah1, Mohamad Khairi Ishak2, Nor Samsiah Sani3, Imran Khan4, Fahad R. Albogamy5, Hirofumi Amano6, Samih M. Mostafa7,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1125-1140, 2022, DOI:10.32604/cmc.2022.025810

    Abstract Software-defined networking (SDN) is a new paradigm that promises to change by breaking vertical integration, decoupling network control logic from the underlying routers and switches, promoting (logical) network control centralization, and introducing network programming. However, the controller is similarly vulnerable to a “single point of failure”, an attacker can execute a distributed denial of service (DDoS) attack that invalidates the controller and compromises the network security in SDN. To address the problem of DDoS traffic detection in SDN, a novel detection approach based on information entropy and deep neural network (DNN) is proposed. This approach contains a DNN-based DDoS traffic… More >

  • Open Access

    ARTICLE

    Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment

    Sriramulu Bojjagani1, D. R. Denslin Brabin2,*, K. Saravanan2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 805-819, 2022, DOI:10.32604/iasc.2022.023771

    Abstract The flow of information is a valuable asset for every company and its consumers, and Distributed Denial-of-Service (DDoS) assaults pose a substantial danger to this flow. If we do not secure security, hackers may steal information flowing across a network, posing a danger to a business and society. As a result, the most effective ways are necessary to deal with the dangers. A DDoS attack is a well-known network infrastructure assault that prevents servers from servicing genuine customers. It is necessary to identify and block a DDoS assault before it reaches the server in order to avoid being refused services.… More >

  • Open Access

    ARTICLE

    An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

    Ghalib H. Alshammri1,2, Amani K. Samha3, Ezz El-Din Hemdan4, Mohammed Amoon1,4, Walid El-Shafai5,6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3529-3548, 2022, DOI:10.32604/cmc.2022.025262

    Abstract Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process. In recent times, the most complex task in Software Defined Network (SDN) is security, which is based on a centralized, programmable controller. Therefore, monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment. Consequently, this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms: K-means, Farthest First, Canopy, Density-based algorithm, and Exception-maximization (EM), using the Waikato Environment for Knowledge Analysis (WEKA) software to compare extensively between these five algorithms.… More >

  • Open Access

    ARTICLE

    Optimized Load Balancing Technique for Software Defined Network

    Aashish Kumar1, Darpan Anand1, Sudan Jha2, Gyanendra Prasad Joshi3, Woong Cho4,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1409-1426, 2022, DOI:10.32604/cmc.2022.024970

    Abstract Software-defined networking is one of the progressive and prominent innovations in Information and Communications Technology. It mitigates the issues that our conventional network was experiencing. However, traffic data generated by various applications is increasing day by day. In addition, as an organization's digital transformation is accelerated, the amount of information to be processed inside the organization has increased explosively. It might be possible that a Software-Defined Network becomes a bottleneck and unavailable. Various models have been proposed in the literature to balance the load. However, most of the works consider only limited parameters and do not consider controller and transmission… More >

  • Open Access

    ARTICLE

    Intelligent Transmission Control for Efficient Operations in SDN

    Reem Alkanhel1, Abid Ali2,3, Faisal Jamil4, Muzammil Nawaz2, Faisal Mehmood5, Ammar Muthanna6,7,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2807-2825, 2022, DOI:10.32604/cmc.2022.019766

    Abstract Although the Software-Defined Network (SDN) is a well-controlled and efficient network but the complexity of open flow switches in SDN causes multiple issues. Many solutions have been proposed so far for the prevention of errors and mistakes in it but yet, there is still no smooth transmission of pockets from source to destination specifically when irregular movements follow the destination host in SDN, the errors include packet loss, data compromise etc. The accuracy of packets received at their desired destination is possible if networks for pockets and hosts are monitored instead of analysis of network snapshot statistically for the state,… More >

  • Open Access

    ARTICLE

    Adaptive Server Load Balancing in SDN Using PID Neural Network Controller

    R. Malavika1,*, M. L. Valarmathi2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 229-243, 2022, DOI:10.32604/csse.2022.020947

    Abstract Web service applications are increasing tremendously in support of high-level businesses. There must be a need of better server load balancing mechanism for improving the performance of web services in business. Though many load balancing methods exist, there is still a need for sophisticated load balancing mechanism for not letting the clients to get frustrated. In this work, the server with minimum response time and the server having less traffic volume were selected for the aimed server to process the forthcoming requests. The Servers are probed with adaptive control of time with two thresholds L and U to indicate the… More >

  • Open Access

    ARTICLE

    DDoS Detection in SDN using Machine Learning Techniques

    Muhammad Waqas Nadeem, Hock Guan Goh*, Vasaki Ponnusamy, Yichiet Aun

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 771-789, 2022, DOI:10.32604/cmc.2022.021669

    Abstract Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure. The SDN controller is considered as the operating system of the SDN based network infrastructure, and it is responsible for executing the different network applications and maintaining the network services and functionalities. Despite all its tremendous capabilities, the SDN face many security issues due to the complexity of the SDN architecture. Distributed denial of services (DDoS) is a common attack on SDN due to its centralized architecture, especially at the control layer of the SDN that has a… More >

  • Open Access

    ARTICLE

    Mobile Fog Computing by Using SDN/NFV on 5G Edge Nodes

    G. R. Sreekanth1,*, S. Ahmed Najat Ahmed2, Marko Sarac3, Ivana Strumberger3, Nebojsa Bacanin3, Miodrag Zivkovic3

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 751-765, 2022, DOI:10.32604/csse.2022.020534

    Abstract Fog computing provides quality of service for cloud infrastructure. As the data computation intensifies, edge computing becomes difficult. Therefore, mobile fog computing is used for reducing traffic and the time for data computation in the network. In previous studies, software-defined networking (SDN) and network functions virtualization (NFV) were used separately in edge computing. Current industrial and academic research is tackling to integrate SDN and NFV in different environments to address the challenges in performance, reliability, and scalability. SDN/NFV is still in development. The traditional Internet of things (IoT) data analysis system is only based on a linear and time-variant system… More >

  • Open Access

    ARTICLE

    SDN Based DDos Mitigating Approach Using Traffic Entropy for IoT Network

    Muhammad Ibrahim1, Muhammad Hanif2, Shabir Ahmad3, Faisal Jamil1, Tayyaba Sehar2, YunJung Lee4, DoHyeun Kim1,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5651-5665, 2022, DOI:10.32604/cmc.2022.017772

    Abstract The Internet of Things (IoT) has been widely adopted in various domains including smart cities, healthcare, smart factories, etc. In the last few years, the fitness industry has been reshaped by the introduction of smart fitness solutions for individuals as well as fitness gyms. The IoT fitness devices collect trainee data that is being used for various decision-making. However, it will face numerous security and privacy issues towards its realization. This work focuses on IoT security, especially DoS/DDoS attacks. In this paper, we have proposed a novel blockchain-enabled protocol (BEP) that uses the notion of a self-exposing node (SEN) approach… More >

Displaying 31-40 on page 4 of 60. Per Page