2022
DOI: 10.53759/181x/jcns202202012
|View full text |Cite
|
Sign up to set email alerts
|

An Design of Software Defined Networks and Possibilities of Network Attacks

Abstract: This article focusses on a rapidly evolving networking architecture known as Software Defined Networking (SDN) and the possibilities of hazards in the network. This architecture introduces decoupled infrastructure, which establishes customization in the networking system hence making it easy to manage, troubleshoot and configure. This paper focusses on the different aspects of the architecture leaving it an intermediate working in between scholarly application, adding on the elements such as security lapses, s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 24 publications
0
0
0
Order By: Relevance
“…By comparing it to recognized signatures or patterns, signature-based detection finds malicious communication. Anomaly-based detection is another popular technique that finds malicious traffic by searching for patterns or actions that differ from typical network activity [15]. Since anomaly-based detection doesn't depend on established signatures, it may be more successful in identifying fresh or undiscovered threats.…”
Section: Intrusion Detection and Prevention In Network Communicationsmentioning
confidence: 99%
“…By comparing it to recognized signatures or patterns, signature-based detection finds malicious communication. Anomaly-based detection is another popular technique that finds malicious traffic by searching for patterns or actions that differ from typical network activity [15]. Since anomaly-based detection doesn't depend on established signatures, it may be more successful in identifying fresh or undiscovered threats.…”
Section: Intrusion Detection and Prevention In Network Communicationsmentioning
confidence: 99%
“…It stores patient's medical report in blockchain and the index value location details are stored in cloud database. Storing of encrypted data and retrieving of decrypted data is done by implementing two fish algorithms [50]. Transaction bodies in medical block chain are Patients, clinical institutions and third-party participants like public users, insurance companies, researchers.…”
Section: Implementation Of Two Fish Algorithmmentioning
confidence: 99%