2020
DOI: 10.1007/s10207-020-00499-3
|View full text |Cite
|
Sign up to set email alerts
|

An SDN approach to detect targeted attacks in P2P fully connected overlays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Hyder and Ismail [22] used port and IP shuffling to improve the security of SDN. Medina-López et al [23] used MTD approaches, by which when the messages are exchanged between hosts, their IP address is changed. So, the intermediary hosts are unaware of the real address.…”
Section: Related Workmentioning
confidence: 99%
“…Hyder and Ismail [22] used port and IP shuffling to improve the security of SDN. Medina-López et al [23] used MTD approaches, by which when the messages are exchanged between hosts, their IP address is changed. So, the intermediary hosts are unaware of the real address.…”
Section: Related Workmentioning
confidence: 99%
“…Medina et al proposed an SDN approach to detect targeted attacks in P2P fully connected overlays [5]. Luo proposes a secure routing protocol, Symmetric-Chord [6], which obtains multiple query results by querying both forward and reverse directions on the chord ring.…”
Section: Related Workmentioning
confidence: 99%
“…Evaluation Metrics Cost DDoS [5] Attack success rate ✗ ✓ [6] Delay ✗ ✓ [7] Cost, packet loss ✓ ✓ TGCESA [8] Delay, packet loss, CPU load ✓ ✓ [9] Delay, attack probability ✗ ✗ [10] Response time, service rate ✗ ✓ [11] Threat score, service risk value ✓ ✗ [12] Delay, information disclosure ✗ ✗ [13] Packet loss, attack success rate ✓ ✓ [14] Defender's success rate ✓ ✗ [15] Detection probability ✓ ✗ [16] Latency, reconnaissance cost ✓ ✓ [17] Attack graph generation time ✓ ✗ BAP [18] Delay, complexity, success rate ✓ ✗ SCEMA Complexity, adversary's success rate, compromised servers rate…”
Section: Referencementioning
confidence: 99%
“…Port shuffling and IP shuffling are employed to prevent reconnaissance attacks in data plane. Medina-López et al [15] used MTD to find malicious nodes in the peer to peer overlay SDN. When messages are exchanged between peers, their destination IP address is changed.…”
Section: Related Workmentioning
confidence: 99%