Movatterモバイル変換


[0]ホーム

URL:


AlDaoud, 2019 - Google Patents

Detection and Mitigation of DHCP Attacks in Openflow-Based SDN Networks

AlDaoud, 2019

Document ID
113350359527569737
Author
AlDaoud M
Publication year
Publication venue
PQDT-Global

External Links

Snippet

Everyday more devices with network capabilities are being added to existing networks. This, in turn, makes networks larger and more susceptible to attacks, and at the same time, requiring a robust and dynamic configuration approach. One approach to alleviate the …
Continue reading atsearch.proquest.com (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • H04L47/2441Flow classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/08Configuration management of network or network elements
    • H04L41/0893Assignment of logical groupings to network elements; Policy based network management or configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/08Configuration management of network or network elements
    • H04L41/0803Configuration setting of network or network elements

Similar Documents

PublicationPublication DateTitle
US11882176B2 (en)Attestation-based scheme for validating peering setups for critical infrastructure protocols
BurchTracing anonymous packets to their approximate source
Izhikevich et al.{LZR}: Identifying unexpected internet services
US10057234B1 (en)Systems and methods for providing network security monitoring
US9584531B2 (en)Out-of band IP traceback using IP packets
US9491189B2 (en)Revival and redirection of blocked connections for intention inspection in computer networks
Man et al.Dns cache poisoning attack: Resurrections with side channels
Mihai-Gabriel et al.Achieving DDoS resiliency in a software defined network by intelligent risk assessment based on neural networks and danger theory
WO2019179375A1 (en)Method and device for defending network attack
AbdelSalam et al.Mitigating ARP spoofing attacks in software-defined networks
François et al.Network security through software defined networking: a survey
Beck et al.Monitoring the neighbor discovery protocol
Jeyanthi et al.Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment
Boppana et al.Analyzing the vulnerabilities introduced by ddos mitigation techniques for software-defined networks
Khosravifar et al.An experience improving intrusion detection systems false alarm ratio by using honeypot
JP2017200152A (en) Communication restriction range identification device, communication control device, communication device, communication system, communication restriction range identification method, and program
US20230208874A1 (en)Systems and methods for suppressing denial of service attacks
AlDaoudDetection and Mitigation of DHCP Attacks in Openflow-Based SDN Networks
Aldaoud et al.Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach
ChatterjeeDesign and development of a framework to mitigate dos/ddos attacks using iptables firewall
HyppönenSecuring a linux server against cyber attacks
CN111431913B (en) Method and device for detecting existence of router advertisement protection mechanism
MirreProtecting Internet Networks Against DoS Attacks
ChoukThe use of BGP Flowspec in the protection against DDoS attacks
Chaganti et al.Analyzing the Vulnerabilities Introduced by DDoS Mitigation Techniques

[8]
ページ先頭

©2009-2025 Movatter.jp