In this project secured threshold value (STV) and sequential probability ratio test (SPRT) were
developed and used to detect and eliminate malicious switches and DDoS attacks in the SDN network.
Enhanced Traffic Based Malicious Switch Detection in SDNAkshaya Arunan
This document outlines a system to detect malicious switches in SDN networks through traffic monitoring. The proposed system design involves capturing all traffic flows using OpenFlow and monitoring for abnormal traffic levels at each switch. If a switch exceeds its predefined threshold for maximum traffic flows, the controller can detect it as potentially malicious and block traffic from that switch. The document describes implementing this detection method using Mininet and OpenDaylight to simulate an SDN network topology and capture traffic with Wireshark. Performance analysis showed the detection approach achieved an average throughput of 31.33 and latency of 14.16. Future work is proposed to improve detection of low traffic DDoS attacks against SDN controllers.
Redundancy Management in Heterogeneous Wireless Sensor NetworksSaeid Hossein Pour
Communication security and reliability are two important issues in any network. A typical communication task in a wireless sensor network is for every sensor node to sense its local environment and, upon request, sends data of interest back to a base station (sink). Due to the distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as a tactical battlefield. Due to resource constraints in the sensor nodes like processing power, memory, bandwidth and power sources, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs.
Security in sensor networks is, therefore, a particularly challenging task. The main requirements of wireless sensor networks are to extend the network lifetime and energy efficiency as well as provide a secure and reliable connection.
In this project redundancy management of heterogeneous wireless sensor networks (HWSNs) is proposed, to answer user queries in the presence of unreliable and malicious nodes. The objective of the redundancy management is to exploit tradeoff between energy consumption against the gain in quality of service (QoS) such as reliability, timeliness and security to maximize the system lifetime. The presence of heterogeneous nodes in a sensor network is known to increase network reliability and lifetime. Selecting multipath routing can yield a variety of benefits such as fault tolerance, increased bandwidth and improved security. Furthermore, the best redundancy level for path redundancy and source redundancy is analyzed and the best intrusion detection system (IDS) is provided.
Ahmed Khurshid
Research Track Part 1
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Jun Bi
Tsinghua University
Research Track Session Part 1
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Evaluation of Mobile IPV6 Protocols in Handover EnvironmentsAnline Jerusha
This is the project to measure the Qos parameters such as Handover-packet loss, blocking Probablity, latency, unknown signal blocking ratio of Mobile IPv6 protocols under handover environments.
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...IJCNCJournal
Flooding attack is a network attack that sends a large amount of traffic to the victim networks or services to cause denial-of-service. In Software-Defined Networking (SDN) environment, this attack might not only breach the hosts and services but also the SDN controller. Besides, it will also cause a disconnection of links between the controller and the switches. Thus, an effective detection and mitigation technique of flooding attacks is required. Statistical analysis techniques are widely used for the detection and mitigation of flooding attacks. However, the effectiveness of these techniques strongly depends on the defined threshold. Defining the static threshold is a tedious job and most of the time produces a high false positive alarm .In this paper, we proposed the dynamic threshold which is calculated using modified adaptive threshold algorithm (MATA). The original ATA is based on the Exponential Weighted Moving Average (EWMA) formula which produces the high number of false alarms. To reduce the false alarms, the alarm signal will only be generated after a minimum number of consecutive violations of the threshold. This, however, has increased the false negative rate when the network is under attack. In order to reduce this false negative rate, MATA adapted the baseline traffic info of the network infrastructure. The comparative analysis of MATA and ATA are performed through the measurement of false negative rate, and accuracy of detection rate. Our experimental results show that MATA is able to reduce false negative rates up to 17.74% and increase the detection accuracy of 16.11%over the various types of flooding attacks at the transport layer.
Threats have become a big problem since the past few years since computer viruses are widely recognized as a significant computer threat. However, the role of Information Technology security must be revisit again since it is too often, IT security managers find themselves in the hopeless situation of trying to uphold a maximum of security as requested from management. While at the same time they are considered an obstacle in the way of developing and introducing new applications into business and government network environments. This paper will focus on Transmission Control Protocol Synchronize Flooding attack detections using the Internet Protocol header as a platform to detect threats, especially in the IP protocol and TCP protocol, and check packets using anomaly detection system which has many advantages, and applied it under the open source Linux. The problem is to detect TCP SYN Flood attack through internet security. This paper also focusing on detecting threats in the local network by monitoring all the packets that goes through the networks. The results show that the proposed detection method can detect TCP SYN Flooding in both normal and attacked network and alert the user about the attack after sending the report to the administrator. As conclusion, TCP SYN Flood and other attacks can be detected through this traffic monitoring tools if the abnormal behaviors of the packets are recognized such as incomplete TCP three-way handshake application and IP header length.
This document discusses a statistical approach for classifying and identifying different types of Distributed Denial of Service (DDoS) attacks using the UCLA dataset. It first introduces DDoS attacks and their increasing prevalence. It then discusses related work on DDoS attack detection. The document outlines the architecture of DDoS attacks and describes some common types like SYN flooding and ACK flooding attacks. The proposed system is described which involves collecting packets, extracting features, using a packet classification algorithm to initially classify attacks, then using a K-Nearest Neighbors classifier for more accurate results. Finally, the system aims to classify and identify specific types of DDoS attacks from the network traffic analysis.
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET Journal
This document proposes a machine learning model using the C4.5 decision tree algorithm to detect DDOS attacks. It trains the model on DDOS attack samples from the CICIDS2017 dataset, dividing the samples into training and test data. The Weka data mining tool is used to build the model with attribute filtering and 10-fold cross-validation. The trained model is then validated on the test data to accurately differentiate between benign and DDOS flooding traffic. This combined signature-based and anomaly-based detection approach can effectively detect complex DDOS attacks.
This document proposes an application-level checkpoint-based approach for fault tolerance in distributed systems. The system uses coordinated checkpointing and systematic process logging to monitor nodes. If a node fails, its state can be reconstructed from checkpoint information. The system is implemented for a distributed multiple sequence alignment application using genetic algorithms. Checkpoints are taken locally at each worker node and globally by the head node to monitor node status and failures.
A short presentation (20 minutes) I gave to an internal audience on the use of attack surface and complexity / coupling metrics in analysing system architectures.
The document proposes OpenSec, an OpenFlow-based security framework that allows network operators to implement security policies across a network. OpenSec uses a simple policy language to define traffic flows, applicable security services, and automated reactions to threats. It routes traffic to external processing units for analysis and uses the OpenFlow controller to implement policies and react to security alerts by modifying flow rules. This provides centralized control, automated response, and moves security monitoring away from the direct data path for improved scalability compared to existing systems.
JPN1402 A Study on False Channel Condition Reporting Attacks in Wireless Ne...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
This document discusses different types of firewalls including packet filtering firewalls, application gateways, circuit gateways, and dynamic packet filters. It describes how each works and their advantages and disadvantages. Packet filtering firewalls use transport layer information to filter packets and are the simplest but least secure. Application gateways use proxies to filter at the application level for specific protocols like HTTP, FTP, and SMTP. Circuit gateways filter at the TCP level. A dynamic packet filter combines these approaches. The document also discusses firewall configuration and limitations, such as not protecting against inside threats.
This document summarizes the IT support and administration duties of an individual including monitoring over 1600 network connections and 1300 servers supporting over 40,000 users. Key responsibilities involved troubleshooting network and system issues, performing regular maintenance and backups, responding to alerts, assisting with projects like virtualization, addressing malware and security incidents, managing user access and authentication technologies, and providing support for email and directory services. The individual also supported the migration to new token-based login requiring significant overtime.
1) Google has built one of the fastest and most capable network infrastructures over the past 15+ years through innovations like global caching, software defined networking, and virtualizing the physical network.
2) Telemetry and analytics are needed in large data center networks to perform network modeling, configuration verification, and fault isolation given their complexity with thousands of switches and links.
3) Systems are used at Google to continuously verify topology matches intent, detect routing inconsistencies within milliseconds, and measure service level agreements and traffic characteristics across all host pairs.
Evaluating the vulnerability of network traffic using joint security and rout...Mumbai Academisc
This document proposes evaluating the vulnerability of network traffic through joint analysis of security and routing protocols in wireless networks. It develops two complementary vulnerability metrics using set theoretic and circuit theoretic interpretations to determine weaknesses. It also formalizes node capture attacks as a nonlinear integer programming problem, and proposes the GNAVE algorithm to approximate node capture using vulnerability evaluation. The hardware requirements include a Pentium IV 2.4 GHz system with 40GB hard disk, 256MB RAM, and Windows XP, while the front end uses Java technology.
A Survey on Data Intrusion schemes used in MANETIRJET Journal
The document discusses data intrusion schemes used in mobile ad hoc networks (MANETs). It reviews common problems with data intrusion in MANETs due to their dynamic architecture and limited resources. Several proposed intrusion detection schemes are described, including distributed and cooperative schemes, specification-based schemes, and the proposed Random Walker Detection method. The proposed method aims to efficiently detect intrusions by deploying detection engines at each node and excluding detection engines from random walkers to reduce detection latency. It is described as working on three network layers and using advanced encryption standards to securely detect and route around malicious nodes.
Pre-filters in-transit malware packets detection in the networkTELKOMNIKA JOURNAL
Conventional malware detection systems cannot detect most of the new malware in the network
without the availability of their signatures. In order to solve this problem, this paper proposes a technique
to detect both metamorphic (mutated malware) and general (non-mutated) malware in the network using a
combination of known malware sub-signature and machine learning classification. This network-based
malware detection is achieved through a middle path for efficient processing of non-malware packets.
The proposed technique has been tested and verified using multiple data sets (metamorphic malware,
non-mutated malware, and UTM real traffic), this technique can detect most of malware packets in
the network-based before they reached the host better than the previous works which detect malware in
host-based. Experimental results showed that the proposed technique can speed up the transmission of
more than 98% normal packets without sending them to the slow path, and more than 97% of malware
packets are detected and dropped in the middle path. Furthermore, more than 75% of metamorphic
malware packets in the test dataset could be detected. The proposed technique is 37 times faster than
existing technique.
This document describes a network scanner project. The network scanner scans a network in real-time to explore connected computers and provide their status. It allows network administrators to efficiently analyze and monitor the network. Key features include classifying network components, bandwidth monitoring and control, and remote access capabilities. The project will be implemented in phases, beginning with a graphical user interface module and also including address calculation, bandwidth capturing, and remote access modules.
This document discusses SDN and network security. It proposes an anomaly detection algorithm to identify malicious activity on an SDN network. The algorithm involves collecting switch statistics, processing the data using time-series analysis, making decisions with fuzzy logic, and training the system with short-term and long-term learning modules. It also describes implementing two SDN security applications: TRW-CB for detecting SYN flooding attacks and rate limiting to control bursty traffic. The document concludes that SDN provides opportunities for effective network security through technologies like OpenFlow.
Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...Lionel Briand
This document presents an approach called DICES for dynamically adapting software-defined networks to control congestion in IoT systems like an emergency management system. DICES uses SDN to monitor network traffic, analyzes congestion using a threshold, computes optimal traffic flow reconfigurations using a multi-objective search algorithm to minimize utilization, cost and delay, and applies the reconfiguration through SDN. An evaluation on an emergency management system case study shows DICES significantly outperforms baseline algorithms by transmitting data at least 3 times faster and reducing data loss by at least 70%.
Performance Analysis and Optimization of Next Generation Wireless Networks (P...University of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
This document proposes using a linear prediction model to detect a wide range of flooding distributed denial of service (DDoS) attacks. It models the entropy of incoming network traffic over time using a linear prediction technique commonly applied to financial time series. The model is tested on simulated network data containing normal traffic and introduced attacks of varying rates. Results show the linear prediction model can successfully detect attacks with low rates and delays by identifying anomalies in the modeled entropy time series compared to normal traffic patterns. This approach aims to provide a fast and effective method for detecting different types of flooding DDoS attacks.
- ThousandEyes delivers network intelligence into every network through cloud, enterprise, and endpoint agents that provide visibility.
- It tackles challenges in hybrid network environments and provides end-to-end visibility through these different agent types located throughout the network.
- The solution also detects internet outages through analyzing aggregated anonymous traffic and routing data from across its global customer base to identify outage events, their scope and likely root causes.
The document summarizes research on load sharing and bandwidth control in mobile peer-to-peer wireless sensor networks (MP2P WSNs) for emergency response scenarios. It explores taking local network conditions and computational capabilities into account during load distribution. Two load sharing algorithms (auction and lookup list) are adapted using a utility function of CPU and bandwidth availability. Experiments on a sensor testbed evaluate the algorithms, showing improved average job completion times when considering both factors. The challenges of inferring network congestion at the application layer without violating abstraction layers are discussed.
A data driven approach for monitoring network eventsJisc
This document proposes a new data-driven approach for monitoring network events using functional connectivity. It introduces a metric to measure statistical dependence between node events based on the number of short-lagged coincidences. An inference framework divides time into windows, calculates pairwise statistics, and learns a model to identify functional connectivity and track changes over time. Results on real-world network data and synthetic data show the approach can predict activity within functional connections and outperforms state-of-the-art methods in scalability. However, validation is challenging without a ground truth, and there is a tradeoff between precision and sensitivity.
A TRANSDUCTIVE SCHEME BASED INFERENCE TECHNIQUES FOR NETWORK FORENSIC ANALYSISAkshaya Arunan
Network forensics is a security infrastructure, and becomes the research focus of forensic investigation. However many challenges still exist in conducting network forensics: network has produced large amounts of data; the comprehensibility of evidence extracting from collected data; the efficiency of evidence analysis methods, etc. To solve these problems, in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments, and extract digital evidence automatically. At the end of the paper, we evaluate our method on a series of experiments on KDD Cup 1999 dataset. The results demonstrate that our methods are actually effective for real-time network forensics, and can provide comprehensible aid for a forensic expert.
This document evaluates shallow and deep network models for analyzing Secure Shell (SSH) traffic. It describes extracting flow feature statistics from network traffic and inputting them into recurrent neural networks (RNNs) and long short-term memory (LSTM) models for classification. The models are tested on public and private network trace datasets for their ability to classify SSH traffic and background applications over SSH versus non-SSH traffic. Deep learning models performed better than machine learning algorithms at traffic classification across different training and testing dataset configurations.
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET Journal
This document proposes a machine learning model using the C4.5 decision tree algorithm to detect DDOS attacks. It trains the model on DDOS attack samples from the CICIDS2017 dataset, dividing the samples into training and test data. The Weka data mining tool is used to build the model with attribute filtering and 10-fold cross-validation. The trained model is then validated on the test data to accurately differentiate between benign and DDOS flooding traffic. This combined signature-based and anomaly-based detection approach can effectively detect complex DDOS attacks.
This document proposes an application-level checkpoint-based approach for fault tolerance in distributed systems. The system uses coordinated checkpointing and systematic process logging to monitor nodes. If a node fails, its state can be reconstructed from checkpoint information. The system is implemented for a distributed multiple sequence alignment application using genetic algorithms. Checkpoints are taken locally at each worker node and globally by the head node to monitor node status and failures.
A short presentation (20 minutes) I gave to an internal audience on the use of attack surface and complexity / coupling metrics in analysing system architectures.
The document proposes OpenSec, an OpenFlow-based security framework that allows network operators to implement security policies across a network. OpenSec uses a simple policy language to define traffic flows, applicable security services, and automated reactions to threats. It routes traffic to external processing units for analysis and uses the OpenFlow controller to implement policies and react to security alerts by modifying flow rules. This provides centralized control, automated response, and moves security monitoring away from the direct data path for improved scalability compared to existing systems.
JPN1402 A Study on False Channel Condition Reporting Attacks in Wireless Ne...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
This document discusses different types of firewalls including packet filtering firewalls, application gateways, circuit gateways, and dynamic packet filters. It describes how each works and their advantages and disadvantages. Packet filtering firewalls use transport layer information to filter packets and are the simplest but least secure. Application gateways use proxies to filter at the application level for specific protocols like HTTP, FTP, and SMTP. Circuit gateways filter at the TCP level. A dynamic packet filter combines these approaches. The document also discusses firewall configuration and limitations, such as not protecting against inside threats.
This document summarizes the IT support and administration duties of an individual including monitoring over 1600 network connections and 1300 servers supporting over 40,000 users. Key responsibilities involved troubleshooting network and system issues, performing regular maintenance and backups, responding to alerts, assisting with projects like virtualization, addressing malware and security incidents, managing user access and authentication technologies, and providing support for email and directory services. The individual also supported the migration to new token-based login requiring significant overtime.
1) Google has built one of the fastest and most capable network infrastructures over the past 15+ years through innovations like global caching, software defined networking, and virtualizing the physical network.
2) Telemetry and analytics are needed in large data center networks to perform network modeling, configuration verification, and fault isolation given their complexity with thousands of switches and links.
3) Systems are used at Google to continuously verify topology matches intent, detect routing inconsistencies within milliseconds, and measure service level agreements and traffic characteristics across all host pairs.
Evaluating the vulnerability of network traffic using joint security and rout...Mumbai Academisc
This document proposes evaluating the vulnerability of network traffic through joint analysis of security and routing protocols in wireless networks. It develops two complementary vulnerability metrics using set theoretic and circuit theoretic interpretations to determine weaknesses. It also formalizes node capture attacks as a nonlinear integer programming problem, and proposes the GNAVE algorithm to approximate node capture using vulnerability evaluation. The hardware requirements include a Pentium IV 2.4 GHz system with 40GB hard disk, 256MB RAM, and Windows XP, while the front end uses Java technology.
A Survey on Data Intrusion schemes used in MANETIRJET Journal
The document discusses data intrusion schemes used in mobile ad hoc networks (MANETs). It reviews common problems with data intrusion in MANETs due to their dynamic architecture and limited resources. Several proposed intrusion detection schemes are described, including distributed and cooperative schemes, specification-based schemes, and the proposed Random Walker Detection method. The proposed method aims to efficiently detect intrusions by deploying detection engines at each node and excluding detection engines from random walkers to reduce detection latency. It is described as working on three network layers and using advanced encryption standards to securely detect and route around malicious nodes.
Pre-filters in-transit malware packets detection in the networkTELKOMNIKA JOURNAL
Conventional malware detection systems cannot detect most of the new malware in the network
without the availability of their signatures. In order to solve this problem, this paper proposes a technique
to detect both metamorphic (mutated malware) and general (non-mutated) malware in the network using a
combination of known malware sub-signature and machine learning classification. This network-based
malware detection is achieved through a middle path for efficient processing of non-malware packets.
The proposed technique has been tested and verified using multiple data sets (metamorphic malware,
non-mutated malware, and UTM real traffic), this technique can detect most of malware packets in
the network-based before they reached the host better than the previous works which detect malware in
host-based. Experimental results showed that the proposed technique can speed up the transmission of
more than 98% normal packets without sending them to the slow path, and more than 97% of malware
packets are detected and dropped in the middle path. Furthermore, more than 75% of metamorphic
malware packets in the test dataset could be detected. The proposed technique is 37 times faster than
existing technique.
This document describes a network scanner project. The network scanner scans a network in real-time to explore connected computers and provide their status. It allows network administrators to efficiently analyze and monitor the network. Key features include classifying network components, bandwidth monitoring and control, and remote access capabilities. The project will be implemented in phases, beginning with a graphical user interface module and also including address calculation, bandwidth capturing, and remote access modules.
This document discusses SDN and network security. It proposes an anomaly detection algorithm to identify malicious activity on an SDN network. The algorithm involves collecting switch statistics, processing the data using time-series analysis, making decisions with fuzzy logic, and training the system with short-term and long-term learning modules. It also describes implementing two SDN security applications: TRW-CB for detecting SYN flooding attacks and rate limiting to control bursty traffic. The document concludes that SDN provides opportunities for effective network security through technologies like OpenFlow.
Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-bas...Lionel Briand
This document presents an approach called DICES for dynamically adapting software-defined networks to control congestion in IoT systems like an emergency management system. DICES uses SDN to monitor network traffic, analyzes congestion using a threshold, computes optimal traffic flow reconfigurations using a multi-objective search algorithm to minimize utilization, cost and delay, and applies the reconfiguration through SDN. An evaluation on an emergency management system case study shows DICES significantly outperforms baseline algorithms by transmitting data at least 3 times faster and reducing data loss by at least 70%.
Performance Analysis and Optimization of Next Generation Wireless Networks (P...University of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
This document proposes using a linear prediction model to detect a wide range of flooding distributed denial of service (DDoS) attacks. It models the entropy of incoming network traffic over time using a linear prediction technique commonly applied to financial time series. The model is tested on simulated network data containing normal traffic and introduced attacks of varying rates. Results show the linear prediction model can successfully detect attacks with low rates and delays by identifying anomalies in the modeled entropy time series compared to normal traffic patterns. This approach aims to provide a fast and effective method for detecting different types of flooding DDoS attacks.
- ThousandEyes delivers network intelligence into every network through cloud, enterprise, and endpoint agents that provide visibility.
- It tackles challenges in hybrid network environments and provides end-to-end visibility through these different agent types located throughout the network.
- The solution also detects internet outages through analyzing aggregated anonymous traffic and routing data from across its global customer base to identify outage events, their scope and likely root causes.
The document summarizes research on load sharing and bandwidth control in mobile peer-to-peer wireless sensor networks (MP2P WSNs) for emergency response scenarios. It explores taking local network conditions and computational capabilities into account during load distribution. Two load sharing algorithms (auction and lookup list) are adapted using a utility function of CPU and bandwidth availability. Experiments on a sensor testbed evaluate the algorithms, showing improved average job completion times when considering both factors. The challenges of inferring network congestion at the application layer without violating abstraction layers are discussed.
A data driven approach for monitoring network eventsJisc
This document proposes a new data-driven approach for monitoring network events using functional connectivity. It introduces a metric to measure statistical dependence between node events based on the number of short-lagged coincidences. An inference framework divides time into windows, calculates pairwise statistics, and learns a model to identify functional connectivity and track changes over time. Results on real-world network data and synthetic data show the approach can predict activity within functional connections and outperforms state-of-the-art methods in scalability. However, validation is challenging without a ground truth, and there is a tradeoff between precision and sensitivity.
A TRANSDUCTIVE SCHEME BASED INFERENCE TECHNIQUES FOR NETWORK FORENSIC ANALYSISAkshaya Arunan
Network forensics is a security infrastructure, and becomes the research focus of forensic investigation. However many challenges still exist in conducting network forensics: network has produced large amounts of data; the comprehensibility of evidence extracting from collected data; the efficiency of evidence analysis methods, etc. To solve these problems, in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments, and extract digital evidence automatically. At the end of the paper, we evaluate our method on a series of experiments on KDD Cup 1999 dataset. The results demonstrate that our methods are actually effective for real-time network forensics, and can provide comprehensible aid for a forensic expert.
This document evaluates shallow and deep network models for analyzing Secure Shell (SSH) traffic. It describes extracting flow feature statistics from network traffic and inputting them into recurrent neural networks (RNNs) and long short-term memory (LSTM) models for classification. The models are tested on public and private network trace datasets for their ability to classify SSH traffic and background applications over SSH versus non-SSH traffic. Deep learning models performed better than machine learning algorithms at traffic classification across different training and testing dataset configurations.
This document summarizes a student project that proposes a new method called SW-CLT for detecting in-band wormhole attacks in wireless ad hoc networks. The method works by detecting changes in end-to-end delay between nodes using a sliding window approach and the central limit theorem. The document outlines the existing sequential change point detection algorithms, describes the new SW-CLT method, and presents simulation results showing SW-CLT can effectively identify wormhole attacks in both stationary and mobile networks. It concludes by comparing SW-CLT to an existing NP-CUSUM method.
This document discusses handoff schemes for high-speed mobile internet services. It describes the issues with mobility and different types of handoffs between networks. It proposes two approaches - a prediction-based approach that performs authentication of neighboring access points in advance, and creating a heterogeneous mobile switching and management network (HMSMN) to support seamless vertical handoffs across different wireless technologies. The HMSMN would detect available networks, make handoff decisions, initiate handoffs using mobility protocols like MIP, and support tight integration with mobility protocols for seamless connectivity during vertical handoffs.
1) The document discusses the development of a traffic data fusion methodology that intelligently combines multiple data sources to obtain more accurate and complete traffic information than any single source can provide alone.
2) Different data sources have strengths and weaknesses depending on traffic conditions, and understanding these strengths and weaknesses helps to resolve differences between sources.
3) Intelligent data fusion using quality measures from multiple sources can provide near-complete traffic coverage and high quality information, improving transport network management and planning.
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is an open access journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
In this paper, we have taken out the concern of security on a Medium Access Control layer
implementing Assured Neighbor based Security Protocol to provide the authentication,
confidentiality and taking in consideration High speed transmission by providing security in
parallel manner in both Routing and Link Layer of Mobile Ad hoc Networks. We basically
divide the protocol into two different segments as the first portion concentrates, based on
Routing layer information; we implement the scheme for the detection and isolation of the
malicious nodes. The trust counter for each node is maintained which actively increased and
decreased considering the trust value for the packet forwarding. The threshold level is defined differencing the malicious and non malicious nodes. If the value of the node in trust counter lacks below the threshold value then the node is considered as malicious. The second part focus on providing the security in the link layer, the security is provided using CTR (Counter) approach for authentication and encryption. Hence simulating the results in NS-2, we come to conclude that the proposed protocol can attain high packet delivery over various intruders while attaining low delays and overheads.
This document discusses the detection of distributed denial of service (DDoS) attacks using different classifiers on the UCLA dataset. It presents a system with modules for packet collection, preprocessing, feature extraction, training/testing data splitting, and classification using K-nearest neighbors (KNN), support vector machines (SVM), and naive Bayesian classifiers. The system is evaluated using metrics like accuracy, sensitivity, specificity, precision, F-measure, and time complexity. Experimental results on the UCLA dataset show that KNN achieved the best performance with 94% accuracy and 96% precision in classifying attack packets from normal packets.
This document proposes a novel service providing protocol with QoS support over mobile ad-hoc networks (MANETs). It collects a list of available service providers and scores them based on reliability and response time to select the best provider. It uses a hidden Markov model to estimate the current state of the network as stable or dynamic, and service availability as normal or faulty. Based on the estimated state, different selection strategies are used to minimize hand-offs and provide reliable service, such as selecting providers with minimum response time in a stable, normal state or adding factors like hop count or mean time to failure in dynamic or faulty states. The method was evaluated in a MANET emulator and shown to improve disconnection and SLA change rates
Clustering-based Analysis for Heavy-Hitter Flow DetectionAPNIC
This document summarizes a research paper that proposes using unsupervised machine learning clustering techniques rather than thresholds to detect heavy hitter (HH) flows in a network. It describes collecting network flow data and analyzing it using algorithms like K-means and Gaussian mixtures to group flows. This identified multiple clusters rather than just two groups (elephants and mice). Further clustering an ambiguous zone revealed patterns that could better classify HH flows without relying on thresholds. The clustering results were then passed to an SDN controller to mark flows and take appropriate actions like re-routing.
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...IJCNCJournal
Software-Defined Network (SDN) is an innovative network architecture with the goal of providing the flexibility and simplicity in network operation and management through a centralized controller. These features help SDN to easily adapt tothe expansion of networkrequirements, but it is also a weakness when it comes to security. With centralized architecture, SDN is vulnerable to cyber-attacks, especially Distributed Denial of Service (DDoS) attack. DDoS is a popular attack type which consumes all network resources and causes congestion in the entire network. In this research, we will introduce a DDoS detection model based on the statistical method with a dynamic threshold value that changes over time. Along with the simulation result, we build a practical SDN model to apply our method, the results show that our method can detectD DoS attacks rapidly with high accuracy.
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...IJCNCJournal
This document discusses a study that proposes a dynamic entropy-based method for detecting DDoS attacks in SDN environments. The study introduces using dynamic threshold values that change over time based on the entropy value variability of network traffic windows, to help predict system state and detect new attacks more accurately compared to static thresholds. The study also evaluates the proposed method in a practical SDN testbed environment, not just in simulations, and finds it can rapidly detect DDoS attacks with high accuracy.
This document discusses analyzing data flow in wireless sensor networks. It first reviews routing techniques used in wireless sensor networks and how they differ based on the application. It then analyzes network reliability by examining link reliability and node energy availability. An expression is derived for instantaneous network reliability and mean time to failure. Simulation results are presented to validate the analysis. Requirements for different types of application data flows are reviewed, including low-bandwidth sensor readings, in-network flood modeling with bi-directional dynamic flows, and high-bandwidth image-based flow measurement. Packet-based and flow-based traffic measurement standards are also discussed.
The document presents Enhanced Adaptive Acknowledgement (EAACK), a secure intrusion detection system for mobile ad hoc networks (MANETs). It discusses common attacks on MANETs like denial of service and eavesdropping. Existing intrusion detection systems for MANETs like Watchdog, TWOACK and AACK are summarized along with their limitations. EAACK is proposed to address these limitations through local and global integration of intrusion results, using home agents to gather system information, and a classifier to identify attacks. EAACK consists of acknowledgements, secure acknowledgements and misbehavior report authentication to detect malicious nodes. It is concluded that detection is important to manage secure networks in addition to prevention mechanisms.
The document discusses intermediate code generation in compilers. It aims to generate a machine-independent intermediate form (IR) that is suitable for optimization and portability. The IR facilitates retargeting compilers to new machines and enables machine-independent code optimization. Common IR representations include abstract syntax trees, directed acyclic graphs, control flow graphs, postfix notation, and three-address code. Three-address code is a simple representation where instructions have at most three operands. It allows efficient code manipulation and optimization.
This document discusses syntax-directed translation, which refers to a method of compiler implementation where the source language translation is completely driven by the parser. The parsing process and parse trees are used to direct semantic analysis and translation of the source program. Attributes and semantic rules are associated with the grammar symbols and productions to control semantic analysis and translation. There are two main representations of semantic rules: syntax-directed definitions and syntax-directed translation schemes. Syntax-directed translation schemes embed program fragments called semantic actions within production bodies and are more efficient than syntax-directed definitions as they indicate the order of evaluation of semantic actions. Attribute grammars can be used to represent syntax-directed translations.
This document discusses operator precedence parsing. It describes operator grammars that can be parsed efficiently using an operator precedence parser. It explains how precedence relations are defined between terminal symbols and how these relations are used during the shift-reduce parsing process to determine whether to shift or reduce at each step. It also addresses handling unary minus operators and recovering from shift/reduce errors during parsing.
The document discusses syntax analysis and parsing. It defines a syntax analyzer as creating the syntactic structure of a source program in the form of a parse tree. A syntax analyzer, also called a parser, checks if a program satisfies the rules of a context-free grammar and produces the parse tree if it does, or error messages otherwise. It describes top-down and bottom-up parsing methods and how parsers use grammars to analyze syntax.
Bottom-up parsing builds a derivation by working from the input sentence back toward the start symbol S. It is preferred in practice and also called LR parsing, where L means tokens are read left to right and R means it constructs a rightmost derivation. The two main types are operator-precedence parsing and LR parsing, which covers a wide range of grammars through techniques like SLR, LALR, and LR parsing. LR parsing reduces a string to the start symbol by inverting productions through identifying handles and replacing them.
The document discusses the structure and process of a compiler. It has two major phases - the front-end and back-end. The front-end performs analysis of the source code by recognizing legal/illegal programs, understanding semantics, and producing an intermediate representation. The back-end translates the intermediate representation into target code. The general structure includes lexical analysis, syntax analysis, semantic analysis, code generation and optimization phases.
Reliable Vancouver Web Hosting with Local Servers & 24/7 Supportsteve198109
Looking for powerful and affordable web hosting in Vancouver? 4GoodHosting offers premium Canadian web hosting solutions designed specifically for individuals, startups, and businesses across British Columbia. With local data centers in Vancouver and Toronto, we ensure blazing-fast website speeds, superior uptime, and enhanced data privacy—all critical for your business success in today’s competitive digital landscape.
Our Vancouver web hosting plans are packed with value—starting as low as $2.95/month—and include secure cPanel management, free domain transfer, one-click WordPress installs, and robust email support with anti-spam protection. Whether you're hosting a personal blog, business website, or eCommerce store, our scalable cloud hosting packages are built to grow with you.
Enjoy enterprise-grade features like daily backups, DDoS protection, free SSL certificates, and unlimited bandwidth on select plans. Plus, our expert Canadian support team is available 24/7 to help you every step of the way.
At 4GoodHosting, we understand the needs of local Vancouver businesses. That’s why we focus on speed, security, and service—all hosted on Canadian soil. Start your online journey today with a reliable hosting partner trusted by thousands across Canada.
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingsteve198109
Vancouver in 2025 is more than scenic views, yoga studios, and oat milk lattes—it’s a thriving hub for eco-conscious entrepreneurs looking to make a real difference. If you’ve ever dreamed of launching a purpose-driven business, now is the time. Whether it’s urban mushroom farming, upcycled furniture sales, or vegan skincare sold online, your green idea deserves a strong digital foundation.
The 2025 Canadian eCommerce landscape is being shaped by trends like sustainability, local innovation, and consumer trust. To stay ahead, eco-startups need reliable hosting that aligns with their values. That’s where 4GoodHosting.com comes in—one of the top-rated Vancouver web hosting providers of 2025. Offering secure, sustainable, and Canadian-based hosting solutions, they help green entrepreneurs build their brand with confidence and conscience.
As eCommerce in Canada embraces localism and environmental responsibility, choosing a hosting provider that shares your vision is essential. 4GoodHosting goes beyond just hosting websites—they champion Canadian businesses, sustainable practices, and meaningful growth.
So go ahead—start that eco-friendly venture. With Vancouver web hosting from 4GoodHosting, your green business and your values are in perfect sync.
Best web hosting Vancouver 2025 for you businesssteve198109
Vancouver in 2025 is more than scenic views, yoga studios, and oat milk lattes—it’s a thriving hub for eco-conscious entrepreneurs looking to make a real difference. If you’ve ever dreamed of launching a purpose-driven business, now is the time. Whether it’s urban mushroom farming, upcycled furniture sales, or vegan skincare sold online, your green idea deserves a strong digital foundation.
The 2025 Canadian eCommerce landscape is being shaped by trends like sustainability, local innovation, and consumer trust. To stay ahead, eco-startups need reliable hosting that aligns with their values. That’s where 4GoodHosting.com comes in—one of the top-rated Vancouver web hosting providers of 2025. Offering secure, sustainable, and Canadian-based hosting solutions, they help green entrepreneurs build their brand with confidence and conscience.
As eCommerce in Canada embraces localism and environmental responsibility, choosing a hosting provider that shares your vision is essential. 4GoodHosting goes beyond just hosting websites—they champion Canadian businesses, sustainable practices, and meaningful growth.
So go ahead—start that eco-friendly venture. With Vancouver web hosting from 4GoodHosting, your green business and your values are in perfect sync.
Traffic Based Malicious Switch and DDoS Detection in Software Defined Network
1. TRAFFIC-BASED MALICIOUS
SWITCH And DDoS DETECTION
IN SOFTWARE DEFINED
NETWORKING
By:
Akshaya Arunan
Roll No: 1
MTech [IT]
Guided By:
Simi Krishna K.R
AssistantProfessor[IT]
2. OUTLINE
• Introduction
• Existing system
• Proposed system
• System design
• Tools
• Implementation
• Threshold value control
• Sequentialprobabilityratio test
• Results
• Conclusion
• Future works
• References
6/29/2017 2Government Engineering College, Barton Hill, Trivandrum
3. INTRODUCTION
Software Defined Network [SDN]:
• Complexity of the network shifts towards the controller.
• Brings simplicity and abstraction to the network operator.
• SDN decouples the control plane from the data plane.
• Migrates to a logically centralized software-based network controller.
• Controller is network-aware.
• Dynamic updating of traffic rules.
6/29/2017 3Government Engineering College, Barton Hill, Trivandrum
5. 6/30/2017 Government Engineering College, Barton Hill, Trivandrum 5
• Application Plane: Contains SDN applications for various functionalities.
• Control Plane: It is a logically centralized control framework that
• runs the NOS,
• maintains global view of the network, and
• provides hardware abstractions to SDN applications.
• Data Plane: It is the combination of forwarding elements used to forward traffic
flows based on instructions from the control plane.
6. OpenFlow [6]:
• Communication protocol
• A protocol - SDN controller communication with the network devices.
• Standardizes the communication - a software-based controller and switches - Open
Flow channel.
• An OpenFlow-compliant switch exposes an abstraction of its forwarding table to
the Open Flow controller.
6/29/2017 6Government Engineering College, Barton Hill, Trivandrum
7. • An Open Flow Switch consists of
at least three parts:
• A Flow Table,
• A Secure Channel,
• The Open Flow Protocol.
6/30/2017 Government Engineering College, Barton Hill, Trivandrum 7
8. EXISTING SYSTEM
• Goal: To detect mobile malware by identifying suspicious network activities
through real-time traffic analysis, which only requires connection establishment
packets.
• A simulation environment on SDN topology is created.
• The TVC is implemented - used to detect malicious switches.
• Each switch has its own threshold
• The controllermaintains the maximum threshold of each switch from its working history.
• Bandwidth between each switch is noted by the controller.
• If the bandwidth crosses the actual bandwidth, then the flow to that particularswitch is
blocked.
• Maintained by the controller.
• The controllerwill not assign flows through any switch beyond its thresholdvalue.
6/29/2017 Government Engineering College, Barton Hill, Trivandrum 8
10. • Disadvantage of TVC:
• Since there can be more flows which are not malicious and may try to enter,
the controller blocks them.
• Also some switches may not know the assigned TVC and may let in the
packets. Here, they may also be blocked.
• Thus, the controller here can be easily compromised.
• Most common attack in SDN is Distributed Denial of Service which also in
not possible to detect with TVC.
• Therefore, to overcome this, SPRT method is introduced.
6/29/2017 10Government Engineering College, Barton Hill, Trivandrum
11. PROPOSED SYSTEM
• Goal: To propose an effective detection method for the DDoS attacks against SDN
controllers by vast new low traffic flows.
• The SDN controller is a vulnerable target of DDoS attacks.
• Many packet-in messages maybe generated and sent to the controller exhausting it or
failing it.
• Breaks down a controller and disrupts the whole network.
6/29/2017 Government Engineering College, Barton Hill, Trivandrum 11
14. EXISTING SYSTEM
• Each switch has a threshold field.
• The controller finds out the threshold value of each switch’s maximum traffic
flows by learning from its working history.
• The controller also knows the bandwidth between every two switches.
• These information's will be maintained at the controller.
• If the controller finds a threshold value greater than the normal value of a
particular switch, it will detect it as malicious and isolate it from the network.
6/29/2017 Government Engineering College, Barton Hill, Trivandrum 14
16. PROPOSED SYSTEM
Detection based on SPRT:
• Aim: To detect whether an interface is compromised.
• Assumption:
• Each switch is capable of obtaining statistical info of the incoming flows and
reporting it to the controller (via OpenFlow, NetwFlow, sFlow).
• Each flow statistics will pass our DDoS detection modules.
6/29/2017 Government Engineering College, Barton Hill, Trivandrum 16
18. Flow Classification[2]:
• Normal flow
• Low traffic flow
Assignments:
• Pr - Probability
• Fb
i – Flow event corresponding to sequence of flows
• xi – sequence of flows
• cb
i - packet counts of flows in a flow event F
• C – Threshold value ( can be obtained and recalibrated)
• b – Observations (1,2,…, n)
• H – Hypothesis
• α – False positive
• β – False negative
• D – Detection function
6/29/2017 18Government Engineering College, Barton Hill, Trivandrum
19. • Flow event Fb
i is defines as Bernoulli random variable:
Fb
i = 1, if cb
i <= Cmax
0, if cb
i >= Cmax
• After classification, function reports to attack detection function.
6/29/2017 19Government Engineering College, Barton Hill, Trivandrum
20. Attack detection based on SPRT:
• Analyzes the list of observed events to decide.
• Consider H1 – detection of compromised interface
H0 – normality
• There are two types of errors:
• False positive – acceptance of H1 when H0 is true
• False negative – acceptance of H0 when H1 is true.
• To avoid the two errors we introduce – α and β as the user defined probabilities of
them, respectively.
• The error rates should not exceed the α and β for false positive and false negative,
respectively.
6/29/2017 20Government Engineering College, Barton Hill, Trivandrum
21. • Consider Dn
i as an evaluation of interface i’s behavior by detection function. Let Dn
i be
the probability ratio considering all n normal flow and low traffic flow events noted for
interface i.
• Upon receiving an event Fb, the detection function evaluates:
Dn
i = Ʃ ln Pr(F1
i,……..,Fn
i | H1)
Pr(F1
i,…….., Fn
i | H0)
• Since Fb is a Bernoulli random variable, let
Pr(Fb
i = 1| H0) = 1- Pr(Fb
i = 0| H0) = λ1
Pr(Fb
i = 1| H1) = 1- Pr(Fb
i = 0| H1) = λ0
where λ1 > λ0 because a compromised interface is more likely to be injected into low traffic
flows to overload controller
6/29/2017 21Government Engineering College, Barton Hill, Trivandrum
22. • λ0 and λ1 are the probability distribution parameters for the flow events and affect
the number of observations required for the detection function to reach a decision
(either H0 or H1).
• SPRT based detection method can be considered as a one dimensional random
walk.
• When low traffic, Fb
i = 1, walk moves upward one step.
• When normal, Fb
i = 0, walk moves downward one step.
• From this two boundaries A and B is produced.
6/29/2017 22Government Engineering College, Barton Hill, Trivandrum
23. Testing compromised interface against a normal interface:
• Given : Two boundaries A and B where B<A on basis of probability ratio, Dn
i
SPRT for H0 against H1 is set as:
A = β / (1- α)
B = (1- β) / α
• The SPRT for H0 against H1 is given as :
Dn
i <= B : accept H0 and terminate the test.
Dn
i >= A : accept H1 and terminate the test.
B < Dn
i < A : continue the test process with an additional observation.
6/29/2017 23Government Engineering College, Barton Hill, Trivandrum
24. RESULTS
• Latency and throughput are the two most fundamental measures of network
performance.
• They are closely related, but whereas latency measures the overall delay in time
for transmission of data between the start of an action and its completion,
throughput is how much data has been transmitted in a given amount of time.
• Therefore here we take the average latency and the throughput to compare
between the two methods.
6/29/2017 Government Engineering College, Barton Hill, Trivandrum 24
25. 6/29/2017 Government Engineering College, Barton Hill, Trivandrum 25
15.8373
14.9247
14.2378
13.8743
13.1289
12.7909
11.6848
10.4576
9.2378
8.9453 8.6953
7.9909
0
2
4
6
8
10
12
14
16
18
5 10 15 20 25 30
AVERAGELATENCY(MS)
TIME(S)
AVERAGE LATENCY
THRESHOLD VALUE LATENCY SPRT LATENCY
From this graph it is clear
that the delay in overall
data transmission of
SPRT method is lesser
compared to the TVC.
Thus the quality of
service of SPRT method
is better than the TVC.
26. 6/29/2017 Government Engineering College, Barton Hill, Trivandrum 26
123.5935 125.9403
128.5839
131.9643
138.8543 140.0955141.8343 143.5934
147.4898
153.3857
158.4872
163.8238
0
20
40
60
80
100
120
140
160
180
5 10 15 20 25 30
THROUGHPUT(MBPS)
TIME(S)
THROUGHPUT
THRESHOLD VALUE THROUGHPUT SPRT THROUGHPUT
From this graph it is
understood that the
data transmitted was
more when the SPRT
method was running
in a particular time.
Thus from this also
we can understand
that the quality od
service of SPRT is
better than TVC and
also the success rate
of data transmission is
also more in SPRT.
27. CONCLUSION
• It can be concluded that it is challenging to choose a threshold value control for
the SDN network as the controller and switches can be easily compromised.
• SPRT detection method is a statistical tool which is a better method to detect
malicious switch especially DDoS attack in SDN compared to the threshold value
and thus removes the possibilities of compromised nodes.
6/29/2017 27Government Engineering College, Barton Hill, Trivandrum
28. FUTURE WORKS
• Implementation of a security method like OpenSec[4] can be implemented as a
further protection in SDN.
• Various types networks (tree, hierarchy) can be used to implement this method and
an comparison can be done to find the better network performance.
6/29/2017 28Government Engineering College, Barton Hill, Trivandrum
29. REFERENCES
1. Xiaodong Du, Ming Zhong Wang, Xiaoping Zhang, “Traffic based malicious
switch Detection in SDN”, International Journal of Security and its applications,
2014.
2. Ping Dong, Xiaojiang Du, Hongke Zhang, “A detection Method for a Novel
DDoS Attack against SDN Controllers by Vast New Low traffic Flows”, IEEE,
2016.
3. Diego Krutz, Fernando M.V. Ramos, Paulo Verissimo, “Software Defined
Networking: A comprehensive Survey”, IEEE, 2014.
4. Adrian Lara and Byrav Ramamurthy, “OpenSec: Policy Based Security Using
Software Defined Networking”, IEEE transactions on network and service
management, 2016.
6/29/2017 29Government Engineering College, Barton Hill, Trivandrum
30. 5. Mihai Nicolae, Laura Gheorge, “SDN Based Security Mechanism”, IEEE, 2015.
6. N. McKeown et al., “Open Flow: Enabling innovation in campus networks,”
SIGCOMM Comput. Commun. Mar. 2008.
7. “http://sdnhub.org/tutorials/ryu/”
8. “http://mininet.org/walkthrough/”
9. “https://github.com/mininet/mininet”
10. “http://www.brianlinkletter.com/how-to-use-miniedit-mininets-graphical-user-
interface/”
6/29/2017 30Government Engineering College, Barton Hill, Trivandrum