Articles with "flooding attack" as a keyword



Photo from wikipedia

Defending against Packet-In messages flooding attack under SDN context

Sign Up to like & get
recommendations!
Published in 2018 at "Soft Computing"

DOI: 10.1007/s00500-018-3407-3

Abstract: Software-defined networking (SDN) is the key outcome of extensive research efforts over the past few decades toward transforming the Internet to a more programmable, configurable, and manageable infrastructure. At the same time, SDN will surely… read more here.

Keywords: attack; messages flooding; packet messages; flooding attack ... See more keywords
Photo by nampoh from unsplash

A novel approach for mitigating route request flooding attack in MANET

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Networks"

DOI: 10.1007/s11276-017-1515-0

Abstract: Mobile ad-hoc network (MANET) is a temporary network in which the main requirement for establishing the communication path among nodes is that the nodes should be cooperative. However, in the presence of malicious node, the MANET’s… read more here.

Keywords: attack; manet; network; novel approach ... See more keywords
Photo from wikipedia

Effectiveness of SIP Server Under SIP Flooding Attack During VoIP Calls

Sign Up to like & get
recommendations!
Published in 2019 at "Wireless Personal Communications"

DOI: 10.1007/s11277-019-06519-3

Abstract: Voice over Internet Protocol (VoIP) service is increasingly one of the most widespread applications since few decades. Data traffic of VoIP service faces various challenges and threats. The Session Initiation Protocol (SIP) flooding attack is… read more here.

Keywords: flooding attack; voip; attack; sip ... See more keywords
Photo by element5digital from unsplash

Countermeasures of interest flooding attack in named data networking: A survey

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Electrical Engineering Education"

DOI: 10.1177/0020720920983518

Abstract: Named data networking (NDN) is a typical representation and implementation of information-centric networking and serves as a basis for the next-generation Internet. However, any network architectur... read more here.

Keywords: countermeasures interest; interest flooding; named data; flooding attack ... See more keywords