مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

88
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

The Presentation of a New Defense Framework Against the Distributed Denial of Service Attacks Using the Software Defined Network

Pages

  273-284

Abstract

 The lack of fixed infrastructure and centralized management in most cloud computing networks causes serious Security threats. In the past few years, different approaches have been taken based on the distributed Software Defined Network (SDN) to counterbalance these facing challenges. One of these common approaches is the SDN-based Pro Defense Framework which uses the threshold intrusion detection to improve Security. Although the distributed Software Defined Network is weak in the face of Distributed Denial of Service Attacks, it expands the scalability of the above-mentioned framework and resolves the point-breaking problems. On the other hand, utilizing the threshold criterion escalates the network vulnerability. In this research, the author suggests a framework called distributed SDN-based multilayer Pro Defense Framework and inspires the input filter or the digital signature, and the hash function based on the Merkle tree is employed as the intrusion prevention agent. This article resolves the threshold intrusion detection criteria by utilizing the Snort intrusion detection system. The results of implementing the suggested framework indicates that it has acceptable traffic control, intrusion detection speed, and stable Security.

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button