2021
DOI: 10.1109/tifs.2021.3127009
|View full text |Cite
|
Sign up to set email alerts
|

An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(8 citation statements)
references
References 49 publications
0
7
0
Order By: Relevance
“…In this group we can find techniques that randomize IP addresses [8,9], ports [10], routes through which the network traffic flows [11] or the header of network packets [12,13]. There are also proposals that combine several shuffling-based MTD techniques [14,15]. Authors in [16] combine IP randomization, packet payload randomization and TCP port scan response adaptation to mitigate reconnaissance attacks.…”
Section: Moving Target Defense Techniquesmentioning
confidence: 99%
“…In this group we can find techniques that randomize IP addresses [8,9], ports [10], routes through which the network traffic flows [11] or the header of network packets [12,13]. There are also proposals that combine several shuffling-based MTD techniques [14,15]. Authors in [16] combine IP randomization, packet payload randomization and TCP port scan response adaptation to mitigate reconnaissance attacks.…”
Section: Moving Target Defense Techniquesmentioning
confidence: 99%
“…The MTD strategy is modeled as a signaling game. Zhou et al [14] also proposed a signaling game for defending DDoS attacks in a cost-effective way. Game theory is also used by Zhou et al [15] and the MTD approach is modeled as a trilateral game.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [88]- [90] consider using SDN architecture to reduce energy consumption in smart cities and industries. In [91] the authors, establish hybrid proactive defense mechanisms combining moving target defense techniques with cyber deception to spread camouflage information to confuse attackers. Based on these mechanisms, they introduce a defender-led signaling game model to formalize defense scenarios and depict the interactions between the defender and the attacker.…”
Section: E Other Issues In Privacy and Security Of Sdn-iotmentioning
confidence: 99%