2020
DOI: 10.1016/j.jnca.2020.102803
|View full text |Cite
|
Sign up to set email alerts
|

A survey of link flooding attacks in software defined network ecosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 162 publications
0
11
0
Order By: Relevance
“…Recently, machine learning and deep learning approaches have been widely used in network security for optimization and classification due to the rapid growth in cloud computing and big data [2]. For instance, Lal et al [9] introduced a framework that can guarantee the security and robustness of those artificial intelligence approaches by preserving the classification with correct labeling.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Recently, machine learning and deep learning approaches have been widely used in network security for optimization and classification due to the rapid growth in cloud computing and big data [2]. For instance, Lal et al [9] introduced a framework that can guarantee the security and robustness of those artificial intelligence approaches by preserving the classification with correct labeling.…”
Section: Related Workmentioning
confidence: 99%
“…Various network attacks had caused severe damage to the Internet community in the real-world over recent years [1][2][3][4][5][6]. The link-flooding attack is a kind of distributed denial of service (DDoS) attack that does not directly attack the target devices but congests the target link with a large number of low-speed flows to reduce the connectivity between end devices, so it is difficult to detect with the intrusion detection system or firewall.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Buts not focussed to optimize the number of controllers to be placed. In [28], the authors addressed the Link Flooding Attacks (LFA) in wired and wireless SDN by identifying its attack types and variants. They categorised and compared the existing mitigation on LFA on SDN ecosystems.…”
Section: Sdn Traffic Managementmentioning
confidence: 99%