ログイン
Language:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 研究者名(五十音順)
  2. 佐藤 和彦(SATO Kazuhiko)
  1. 学術雑誌論文

Layer Based Firewall Application for Detection and Mitigation of Flooding Attack on SDN Network

http://hdl.handle.net/10258/0002000065
http://hdl.handle.net/10258/0002000065
b1c3c8c7-2fcb-4bb3-9242-9785515e72c3
名前 / ファイル ライセンス アクション
JENRS_0105010.pdf JENRS_0105010.pdf (1.5 MB)
license.icon
アイテムタイプ 学術雑誌論文 / Journal Article.(1)
公開日 2023-10-05
書誌情報 en : Journal of Engineering Research and Sciences

巻 1, 号 5, p. 88-101, ページ数 14, 発行日 2022
タイトル
タイトル Layer Based Firewall Application for Detection and Mitigation of Flooding Attack on SDN Network
言語 en
言語
言語 eng
キーワード
言語 en
主題Scheme Other
主題 Software Defined Network
キーワード
言語 en
主題Scheme Other
主題 Flooding Attack
キーワード
言語 en
主題Scheme Other
主題 Layer Based Security Architecture
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ journal article
著者 Gautam, Yubaraj

× Gautam, Yubaraj

en Gautam, Yubaraj

Search repository
佐藤, 和彦

× 佐藤, 和彦

en Sato, Kazuhiko

ja 佐藤, 和彦


Search repository
Gautam, Bishnu Prasad

× Gautam, Bishnu Prasad

en Gautam, Bishnu Prasad

Search repository
抄録
内容記述タイプ Abstract
内容記述 Software-Defined Networking (SDN) is an emerging Network technology that can augment the data plane with control plane by using programming technique. However, there are a numbers of security challenges which are required to address to achieve secured communication. Flooding attack is one of the most common threats on the internet for the last decades which is becoming the challenging issues in SDN networks too. To address these issues, we proposed a novel firewall application developed based on the multiple stages of packets filtering technique to provide flooding attack prevention system and layer-based packets detection system. In this research, we are using two main stages to detect the flooding attack and mitigate the flooding packets. The first stage is to identify the attacks and, the second stage is to identify the attacker’s information and act them based on layer-based packet header entity. The system contains two security entities to identify the flooding attacks, one is by measuring the packet size, and the other is by counting the packets flow. We used the details of packets flow to control over the flow and to identify the attacks being occurred or not. Along with, to identify the attacker’s information, we used layers (layer 2 to layer 4) based packet header entities by using multi-table architecture. The proposed solution was tested for different attack scenarios and successfully reduced the flow of volume-based bulk-size flooding attack and infinite packets flooding attack in SDN network.
言語 en
DOI
関連タイプ isIdenticalTo
識別子タイプ DOI
関連識別子 10.55708/js0105010
ISSN
収録物識別子タイプ EISSN
収録物識別子 2831-4085
権利
権利情報 © Copyright JENRS 2023. All Right Reserved.
言語 en
著者版フラグ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
戻る
0
views
See details
Views

Versions

Ver.1 2023-10-05 03:35:08.756804
Show All versions

Share

Share
tweet

Cite as

Other

print

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX
  • ZIP

コミュニティ

確認

確認

確認


Powered by WEKO3


Powered by WEKO3