Proceedings of the 3rd International Conference on Future Networks and Distributed Systems 2019
DOI: 10.1145/3341325.3342037
|View full text |Cite
|
Sign up to set email alerts
|

FlowJustifier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…However, multi-level authentication also has an impact on network performance. Sarwar et al [70] proposed a traffic forwarding method based on user trust. This method establishes user trust and directs traffic in the queue according to the level of user trust, while discarding unauthorized user traffic.…”
Section: Policy-based Ddos Attack Mitigation Techniquesmentioning
confidence: 99%
“…However, multi-level authentication also has an impact on network performance. Sarwar et al [70] proposed a traffic forwarding method based on user trust. This method establishes user trust and directs traffic in the queue according to the level of user trust, while discarding unauthorized user traffic.…”
Section: Policy-based Ddos Attack Mitigation Techniquesmentioning
confidence: 99%
“…Sarwar et al [71] present FlowJustifier, a request prioritization algorithm based on a trust return value list, which seeks to mitigate the DDoS attacks that target the SDN-based IoT infrastructure control plane. The list employs confidence values to classify users according to their level of confidentiality, which is established based on the records of each user's network activities.…”
Section: Request Prioritizationmentioning
confidence: 99%
“…Bull et al [72] Xu et al [55] Salva-Garcia et al [40] & Molina Zarca et al [57] Rafique et al [61] Bawany and Shamsi [31] Yang et al [60] Rafique et al [74] Nair et al [65] Galeano-Brajones et al [68] Ravi and Shalinie [64] Rate limiting Sharma et al [69] Traceback Chen et al [45] Request prioritization Sarwar et al [71] Flow filtering MTD Sahay et al [73] Honeypots MTD Luo et al [75] Hybrid SDN-Fog…”
Section: Flow Filteringmentioning
confidence: 99%
See 2 more Smart Citations