Technology

PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS

Abstract The physical layer of an optical network may be attacked in numerous ways, such as by jamming, assaults on the physical infrastructure, eavesdropping, and interception. As the requirement for network capacity develops, the physical layer of the optical network must be kept secure. In this overview article, specialists look at security problems in optical […]

PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS Read More »

Advanced architectures for high-performance networking

Critical Analysis In this in-depth research project, Muneer Alshowkan and his colleagues investigate cutting-edge architectural concepts for high-performance quantum networking. Quantum networks are required in order to make the most effective use of the fundamental quantum resources. If quantum systems are unable to communicate with one another, then progress in the field of quantum information

Advanced architectures for high-performance networking Read More »

What are DDoS attacks and Software Defined Networks(SDN)?

1. INTRODUCTION a. CONTEXT The concept of “software-defined networks” (SDNs) has recently attracted a lot of attention in the academic community. When using the SDN paradigm, it is much simpler to design a resilient, adaptable, and safe network infrastructure. The key innovation of SDN is the decoupling of the control plane from the underlying infrastructure.

What are DDoS attacks and Software Defined Networks(SDN)? Read More »

SOFTWARE DEFINED NETWORK (SDN) PARADIGM??

1: INTRODUCTION: a. CONTEXT: Network protocols and devices have evolved to handle a plethora of new technologies as smartphone technology and Internet applications have grown more widespread. “Mastering complexity” is the term used by many in the field of computer networks to describe this process. Several options have been proposed. Many varieties of electronic devices

SOFTWARE DEFINED NETWORK (SDN) PARADIGM?? Read More »

Detecting ARP Attacks in SDN-Based Cloud Environment

1: INTRODUCTION: a. CONTEXT: Thanks to cloud computing, it’s quite simple for consumers to get access to a large group’s worth of servers, platforms, and software. There are a variety of safeguards put in place by cloud service providers to ensure client satisfaction and the dependability of their services. Cloud computing is rapidly becoming into

Detecting ARP Attacks in SDN-Based Cloud Environment Read More »

SDN Security Mechanism to Detect Malicious Activities

1: INTRODUCTION: a. CONTEXT: Setup and management of data networks have become less laborious with the advent of software-defined networking (SDN). There was no magical emergence of this technology. A more accurate explanation is that it arose from efforts to simplify network programming. Distributed system networking. The SDN architecture relies heavily on the separation of

SDN Security Mechanism to Detect Malicious Activities Read More »

Mechanism to Prevent ARP Spoofing and Broadcasting in SDN

1: INTRODUCTION: a. CONTEXT: New technologies have emerged during the last decade, including cloud computing, the Internet of Things, voice over IP, multimedia, big data, etc., all of which have stringent requirements for bandwidth, scalability, accessibility, and dynamic administration. To ensure compliance with established policies, network administrators must configure each network device independently, frequently according

Mechanism to Prevent ARP Spoofing and Broadcasting in SDN Read More »

An Evolutionary SVM Model for DDOS Attack Detection

1: INTRODUCTION: a) Context The concept of “software-defined networks” (SDNs) has recently attracted a lot of attention in the academic community (SDN). When using the SDN paradigm, it is much simpler to design a resilient, adaptable, and safe network infrastructure. The key innovation of SDN is the decoupling of the control plane from the underlying

An Evolutionary SVM Model for DDOS Attack Detection Read More »

A Flexible SDN-Based Architecture Identifying Low Rate DDoS

1: INTRODUCTION: a. CONTEXT: One of the most difficult types of distributed denial of service (DDoS) attacks to detect is the low-rate kind (LR-DDoS). In contrast to high-rate DDoS assaults, low-rate DDoS (LR-DDoS) attacks do not overwhelm a network with an overwhelming volume of data. Instead, it selectively activates parts of the protocol, such as

A Flexible SDN-Based Architecture Identifying Low Rate DDoS Read More »

A Deep CNN Ensemble Framework for Efficient DDoS Attack

1: INTRODUCTION: a. CONTEXT: Nowadays, ICT (information and communication technology) solutions play an integral role in our personal, professional, and economic life. The development of technology has an immediate impact on a nation’s economy. Data systems are more susceptible to a broad variety of cyber assaults and breaches as technology improves. Additionally, there are new

A Deep CNN Ensemble Framework for Efficient DDoS Attack Read More »

Scroll to Top