2021
DOI: 10.1007/s11277-021-08805-5
|View full text |Cite
|
Sign up to set email alerts
|

QEMDD: Quantum Inspired Ensemble Model to Detect and Mitigate DDoS Attacks at Various Layers of SDN Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 31 publications
0
1
0
Order By: Relevance
“…These attacks are due to both quantum and classical security attacks [1,6,10]. One of the most prominent attacks that threaten cybersecurity is the DDoS attacks [2,9,32]. The idea of these attacks is to use multiple machines to send an extensive number of malicious requests to capture a network or harm the distributed system components.…”
Section: Introduction and Background Informationmentioning
confidence: 99%
See 1 more Smart Citation
“…These attacks are due to both quantum and classical security attacks [1,6,10]. One of the most prominent attacks that threaten cybersecurity is the DDoS attacks [2,9,32]. The idea of these attacks is to use multiple machines to send an extensive number of malicious requests to capture a network or harm the distributed system components.…”
Section: Introduction and Background Informationmentioning
confidence: 99%
“…This is because the LDAP protocol is built on top of the TCP/IP protocol and serves to set up authentication policies for a large number of users. By leveraging the LDAP protocol, it becomes possible to authenticate all employees in an organization simultaneously, eliminating the need for individual authentication policies [2,21,22]. As a result, it is crucial to implement robust security approaches for the LDAP protocol.…”
Section: Introduction and Background Informationmentioning
confidence: 99%
“…The application instructs the controller to reprogramme the data plane whenever an abnormality is identified [7]. Where these devices within the network contain special open interfaces that are managed by software, therefore the control and data planes run on routers dispersed across the network [8].…”
Section: Introductionmentioning
confidence: 99%