You are currently viewing a new version of our website. To view the old version click .

10 Results Found

  • Article
  • Open Access
9 Citations
6,100 Views
28 Pages

Counteracting UDP Flooding Attacks in SDN

  • Yung-Hao Tung,
  • Hung-Chuan Wei,
  • Yen-Wu Ti,
  • Yao-Tung Tsou,
  • Neetesh Saxena and
  • Chia-Mu Yu

Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN archite...

  • Article
  • Open Access
1 Citations
1,327 Views
28 Pages

24 March 2025

This work studies the hypothesis of whether the UDP DoS attack affects voice and video flows in a VoIP network. It is a continuation of a previous work that studied the same hypothesis, but the VoIP server was under different types of TCP DoS attacks...

  • Article
  • Open Access
1 Citations
638 Views
25 Pages

8 September 2025

Distributed denial-of-service (DDoS) attacks are a prevalent threat to resource-constrained IoT deployments. We present an edge-based detection and mitigation system integrated with the oneM2M architecture. By using a Raspberry Pi 4 client and five R...

  • Article
  • Open Access
10 Citations
3,104 Views
20 Pages

The design of existing machine-learning-based DoS detection systems in software-defined networking (SDN) suffers from two major problems. First, the proper time window for conducting network traffic analysis is unknown and has proven challenging to d...

  • Article
  • Open Access
3 Citations
2,935 Views
22 Pages

From Replay to Regeneration: Recovery of UDP Flood Network Attack Scenario Based on SDN

  • Yichuan Wang,
  • Junxia Ding,
  • Tong Zhang,
  • Yeqiu Xiao and
  • Xinhong Hei

17 April 2023

In recent years, various network attacks have emerged. These attacks are often recorded in the form of Pcap data, which contains many attack details and characteristics that cannot be analyzed through traditional methods alone. Therefore, restoring t...

  • Article
  • Open Access
8 Citations
3,113 Views
24 Pages

21 July 2022

To provide a low-cost methodical way for inference-driven insight into the assessment of SDN operations, a behavioral study of key network parameters that predicate the proper functioning and performance of software-defined networks (SDNs) is present...

  • Article
  • Open Access
2 Citations
2,140 Views
32 Pages

Extracting Optimal Number of Features for Machine Learning Models in Multilayer IoT Attacks

  • Badeea Al Sukhni,
  • Soumya K. Manna,
  • Jugal M. Dave and
  • Leishi Zhang

19 December 2024

The rapid integration of Internet of Things (IoT) systems in various sectors has escalated security risks due to sophisticated multilayer attacks that compromise multiple security layers and lead to significant data loss, personal information theft,...

  • Article
  • Open Access
99 Citations
8,066 Views
22 Pages

An Investigation into the Application of Deep Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers

  • James Dzisi Gadze,
  • Akua Acheampomaa Bamfo-Asante,
  • Justice Owusu Agyemang,
  • Henry Nunoo-Mensah and
  • Kwasi Adu-Boahen Opare

Software-Defined Networking (SDN) is a new paradigm that revolutionizes the idea of a software-driven network through the separation of control and data planes. It addresses the problems of traditional network architecture. Nevertheless, this brillia...

  • Article
  • Open Access
979 Views
27 Pages

6 August 2025

Modern cloud-based Internet of Things (IoT) infrastructures face increasingly sophisticated and diverse cyber threats that challenge traditional detection systems in terms of scalability, adaptability, and explainability. In this paper, we present (H...

  • Article
  • Open Access
20 Citations
3,712 Views
20 Pages

13 May 2023

Industrial automation and control systems have gained increasing attention in the literature recently. Their integration with various systems has triggered considerable developments in critical infrastructure systems. With different network structure...