2018
DOI: 10.48550/arxiv.1802.05679
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Experimental Demonstration of DDoS Mitigation over a Quantum Key Distribution (QKD) Network Using Software Defined Networking (SDN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Therefore, based on this, the MitM attacker is prevented because of the timestamp of the response since the time taken by the attacker to decrypt a random number would certainly exceed the timeframe of the client's response to the server request. While, authors explain in [19] a method for detecting DDoS attacks in the SDN depended on the quantum parameters of QKD system, such as the secret key rate (SKR) and quantum bit error rate (QBER). Where the controller monitors the QBER, if the rate exceeds the > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 2 the need to add new components to the network, namely the controller and communication channels between the planes, which include many challenges that pose security problems that deserve attention.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, based on this, the MitM attacker is prevented because of the timestamp of the response since the time taken by the attacker to decrypt a random number would certainly exceed the timeframe of the client's response to the server request. While, authors explain in [19] a method for detecting DDoS attacks in the SDN depended on the quantum parameters of QKD system, such as the secret key rate (SKR) and quantum bit error rate (QBER). Where the controller monitors the QBER, if the rate exceeds the > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 2 the need to add new components to the network, namely the controller and communication channels between the planes, which include many challenges that pose security problems that deserve attention.…”
Section: Related Workmentioning
confidence: 99%