2021
DOI: 10.1007/s11235-020-00747-w
|View full text |Cite
|
Sign up to set email alerts
|

Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
66
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 142 publications
(67 citation statements)
references
References 20 publications
0
66
0
1
Order By: Relevance
“…Several statistical approaches based on time series [ 21 ], multivariate linear regression [ 22 ], grey forecasting models [ 23 , 24 ], backpropagation neural networks [ 25 , 26 ] and simulation models [ 27 ] have been introduced by authors to predict ubiquitous cases. Many authors have applied models on different applications [ 28 30 ]. In another study, authors discussed different factors that affect epidemics and determined the dissemination of the disease [ 31 ], 32 .…”
Section: Related Workmentioning
confidence: 99%
“…Several statistical approaches based on time series [ 21 ], multivariate linear regression [ 22 ], grey forecasting models [ 23 , 24 ], backpropagation neural networks [ 25 , 26 ] and simulation models [ 27 ] have been introduced by authors to predict ubiquitous cases. Many authors have applied models on different applications [ 28 30 ]. In another study, authors discussed different factors that affect epidemics and determined the dissemination of the disease [ 31 ], 32 .…”
Section: Related Workmentioning
confidence: 99%
“…The development of several types of systems to ensure the security of critical infrastructures is the result of the need to deal with the threats and attacks in critical infrastructures such as nuclear power plants [13]. Scholars have proposed a number of technical measures that include technological tools to prevent [14,15], defend [16], detect [17], mitigate [18], and respond to cyber attacks. One way to check if a system is being attacked or an intruder has gained access to it is to detect abnormal behavior.…”
Section: Related Workmentioning
confidence: 99%
“…Because the RTT increment is faster, the value of Cost gradually increases. 22), (24), and (25), versus RTT, meanwhile, presents the simulation results for comparison. We can observe that the simulation values are consistent with the theoretical values.…”
Section: Effect Of Network Parameters On Attack Performancementioning
confidence: 99%
“…Fig.22plots the curves of the theoretical TCP throughput for the D-and S-models according to (20)-(22),(24), and (25), versus RTT, meanwhile, presents the simulation results for comparison. We can observe that the simulation values are consistent with the theoretical values.…”
mentioning
confidence: 99%