Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (59)
  • Open Access

    ARTICLE

    A Multi-Constraint Path Optimization Scheme Based on Information Fusion in Software Defined Network

    Jinlin Xu1,2, Wansu Pan1,*, Longle Cheng1,2, Haibo Tan1,2, Munan Yuan1,*, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1399-1418, 2024, DOI:10.32604/cmc.2024.049622

    Abstract The existing multipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is a lack of cooperation between the terminal and network sides, making it difficult to achieve dynamic adaptation of service requirements and network resources. To address these issues, we propose a multi-constraint path optimization scheme based on information fusion in SDN. The proposed scheme collects network topology and network state information on the network side and computes disjoint paths between end hosts. It uses the Fuzzy Analytic Hierarchy Process (FAHP) to calculate the weight coefficients of multiple constrained parameters and constructs a composite quality… More >

  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order… More >

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can classify the DDoS attack traffic… More >

  • Open Access

    ARTICLE

    Data Analysis of Network Parameters for Secure Implementations of SDN-Based Firewall

    Rizwan Iqbal1,*, Rashid Hussain2, Sheeraz Arif3, Nadia Mustaqim Ansari4, Tayyab Ahmed Shaikh2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1575-1598, 2023, DOI:10.32604/cmc.2023.042432

    Abstract Software-Defined Networking (SDN) is a new network technology that uses programming to complement the data plane with a control plane. To enable safe connection, however, numerous security challenges must be addressed. Flooding attacks have been one of the most prominent risks on the internet for decades, and they are now becoming challenging difficulties in SDN networks. To solve these challenges, we proposed a unique firewall application built on multiple levels of packet filtering to provide a flooding attack prevention system and a layer-based packet detection system. This study offers a systematic strategy for wrapping up the examination of SDN operations.… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of different key performance indicators (KPIs)… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    REVIEW

    Managing Smart Technologies with Software-Defined Networks for Routing and Security Challenges: A Survey

    Babangida Isyaku1,2, Kamalrulnizam Bin Abu Bakar2,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1839-1879, 2023, DOI:10.32604/csse.2023.040456

    Abstract Smart environments offer various services, including smart cities, e-healthcare, transportation, and wearable devices, generating multiple traffic flows with different Quality of Service (QoS) demands. Achieving the desired QoS with security in this heterogeneous environment can be challenging due to traffic flows and device management, unoptimized routing with resource awareness, and security threats. Software Defined Networks (SDN) can help manage these devices through centralized SDN controllers and address these challenges. Various schemes have been proposed to integrate SDN with emerging technologies for better resource utilization and security. Software Defined Wireless Body Area Networks (SDWBAN) and Software Defined Internet of Things (SDIoT)… More >

  • Open Access

    ARTICLE

    An Optimized Approach for Spectrum Utilization in mmWave Massive MIMO 5G Wireless Networks

    Elsaid Md. Abdelrahim1,2, Mona Alduailij3, Mai Alduailij3, Romany F. Mansour4,*, Osama A. Ghoneim5

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1493-1505, 2023, DOI:10.32604/csse.2023.037976

    Abstract Massive multiple-input multiple-output (MIMO) systems that use the millimeter-wave (mm-wave) band have a higher frequency and more antennas, which leads to significant path loss, high power consumption, and server interference. Due to these issues, the spectrum efficiency is significantly reduced, making spectral efficiency improvement an important research topic for 5G communication. Together with communication in the terahertz (THz) bands, mmWave communication is currently a component of the 5G standards and is seen as a solution to the commercial bandwidth shortage. The quantity of continuous, mostly untapped bandwidth in the 30–300 GHz band has presented a rare opportunity to boost the capacity… More >

  • Open Access

    ARTICLE

    Anomaly Detection and Access Control for Cloud-Edge Collaboration Networks

    Bingcheng Jiang, Qian He*, Zhongyi Zhai, Hang Su

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2335-2353, 2023, DOI:10.32604/iasc.2023.039989

    Abstract Software-defined networking (SDN) enables the separation of control and data planes, allowing for centralized control and management of the network. Without adequate access control methods, the risk of unauthorized access to the network and its resources increases significantly. This can result in various security breaches. In addition, if authorized devices are attacked or controlled by hackers, they may turn into malicious devices, which can cause severe damage to the network if their abnormal behaviour goes undetected and their access privileges are not promptly restricted. To solve those problems, an anomaly detection and access control mechanism based on SDN and neural… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Topologies for Multi-Domain Software-Defined Networking

    Jiangyuan Yao1, Weiping Yang1, Shuhua Weng1, Minrui Wang1, Zheng Jiang2, Deshun Li1,*, Yahui Li3, Xingcan Cao4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 741-755, 2023, DOI:10.32604/csse.2023.031531

    Abstract Software-defined networking (SDN) is widely used in multiple types of data center networks, and these distributed data center networks can be integrated into a multi-domain SDN by utilizing multiple controllers. However, the network topology of each control domain of SDN will affect the performance of the multi-domain network, so performance evaluation is required before the deployment of the multi-domain SDN. Besides, there is a high cost to build real multi-domain SDN networks with different topologies, so it is necessary to use simulation testing methods to evaluate the topological performance of the multi-domain SDN network. As there is a lack of… More >

  • Open Access

    ARTICLE

    Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network

    Tarcízio Ferrão1,*, Franklin Manene2, Adeyemi Abel Ajibesin3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4985-5007, 2023, DOI:10.32604/cmc.2023.038276

    Abstract Currently, the Internet of Things (IoT) is revolutionizing communication technology by facilitating the sharing of information between different physical devices connected to a network. To improve control, customization, flexibility, and reduce network maintenance costs, a new Software-Defined Network (SDN) technology must be used in this infrastructure. Despite the various advantages of combining SDN and IoT, this environment is more vulnerable to various attacks due to the centralization of control. Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service (DDoS) attacks, but they often lack mechanisms to mitigate their severity. This paper proposes a Multi-Attack Intrusion Detection System… More >

Displaying 1-10 on page 1 of 59. Per Page