Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

    Khawaja Tahir Mehmood1,2,*, Shahid Atiq1, Intisar Ali Sajjad3, Muhammad Majid Hussain4, Malik M. Abdul Basit2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1673-1708, 2024, DOI:10.32604/cmes.2024.053903 - 27 September 2024

    Abstract Software-Defined Networking (SDN), with segregated data and control planes, provides faster data routing, stability, and enhanced quality metrics, such as throughput (Th), maximum available bandwidth (Bd(max)), data transfer (DTransfer), and reduction in end-to-end delay (D(E-E)). This paper explores the critical work of deploying SDN in large­scale Data Center Networks (DCNs) to enhance its Quality of Service (QoS) parameters, using logically distributed control configurations. There is a noticeable increase in Delay(E-E) when adopting SDN with a unified (single) control structure in big DCNs to handle Hypertext Transfer Protocol (HTTP) requests causing a reduction in network quality parameters (Bd(max), Th, DTransfer, D(E-E),… More > Graphic Abstract

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

  • Open Access

    ARTICLE

    Network Traffic Synthesis and Simulation Framework for Cybersecurity Exercise Systems

    Dong-Wook Kim1, Gun-Yoon Sin2, Kwangsoo Kim3, Jaesik Kang3, Sun-Young Im3, Myung-Mook Han1,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3637-3653, 2024, DOI:10.32604/cmc.2024.054108 - 12 September 2024

    Abstract In the rapidly evolving field of cybersecurity, the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical. Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats. To address this gap, we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems. Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field. The cornerstone of our approach is the use of a conditional tabular generative adversarial network (CTGAN),… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077 - 17 November 2023

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952 - 29 November 2023

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Topologies for Multi-Domain Software-Defined Networking

    Jiangyuan Yao1, Weiping Yang1, Shuhua Weng1, Minrui Wang1, Zheng Jiang2, Deshun Li1,*, Yahui Li3, Xingcan Cao4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 741-755, 2023, DOI:10.32604/csse.2023.031531 - 26 May 2023

    Abstract Software-defined networking (SDN) is widely used in multiple types of data center networks, and these distributed data center networks can be integrated into a multi-domain SDN by utilizing multiple controllers. However, the network topology of each control domain of SDN will affect the performance of the multi-domain network, so performance evaluation is required before the deployment of the multi-domain SDN. Besides, there is a high cost to build real multi-domain SDN networks with different topologies, so it is necessary to use simulation testing methods to evaluate the topological performance of the multi-domain SDN network. As… More >

  • Open Access

    ARTICLE

    Sea Turtle Foraging Optimization-Based Controller Placement with Blockchain-Assisted Intrusion Detection in Software-Defined Networks

    Sultan Alkhliwi*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4735-4752, 2023, DOI:10.32604/cmc.2023.037141 - 29 April 2023

    Abstract Software-defined networking (SDN) algorithms are gaining increasing interest and are making networks flexible and agile. The basic idea of SDN is to move the control planes to more than one server’s named controllers and limit the data planes to numerous sending network components, enabling flexible and dynamic network management. A distinctive characteristic of SDN is that it can logically centralize the control plane by utilizing many physical controllers. The deployment of the controller—that is, the controller placement problem (CPP)—becomes a vital model challenge. Through the advancements of blockchain technology, data integrity between nodes can be… More >

  • Open Access

    ARTICLE

    ProbD: Faulty Path Detection Based on Probability in Software-Defined Networking

    Jiangyuan Yao1, Jiawen Wang1, Shuhua Weng1, Minrui Wang1, Deshun Li1,*, Yahui Li2, Xingcan Cao3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1783-1796, 2023, DOI:10.32604/iasc.2023.034265 - 05 January 2023

    Abstract With the increasing number of switches in Software-Defined Networking (SDN), there are more and more faults rising in the data plane. However, due to the existence of link redundancy and multi-path forwarding mechanisms, these problems cannot be detected in time. The current faulty path detection mechanisms have problems such as the large scale of detection and low efficiency, which is difficult to meet the requirements of efficient faulty path detection in large-scale SDN. Concerning this issue, we propose an efficient network path fault testing model ProbD based on probability detection. This model achieves a high… More >

  • Open Access

    ARTICLE

    Adaptive Partial Task Offloading and Virtual Resource Placement in SDN/NFV-Based Network Softwarization

    Prohim Tam1, Sa Math1, Seokhoon Kim1,2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2141-2154, 2023, DOI:10.32604/csse.2023.030984 - 03 November 2022

    Abstract Edge intelligence brings the deployment of applied deep learning (DL) models in edge computing systems to alleviate the core backbone network congestions. The setup of programmable software-defined networking (SDN) control and elastic virtual computing resources within network functions virtualization (NFV) are cooperative for enhancing the applicability of intelligent edge softwarization. To offer advancement for multi-dimensional model task offloading in edge networks with SDN/NFV-based control softwarization, this study proposes a DL mechanism to recommend the optimal edge node selection with primary features of congestion windows, link delays, and allocatable bandwidth capacities. Adaptive partial task offloading policy… More >

  • Open Access

    ARTICLE

    Detection Collision Flows in SDN Based 5G Using Machine Learning Algorithms

    Aqsa Aqdus1, Rashid Amin1,*, Sadia Ramzan1, Sultan S. Alshamrani2, Abdullah Alshehri3, El-Sayed M. El-kenawy4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1413-1435, 2023, DOI:10.32604/cmc.2023.031719 - 22 September 2022

    Abstract The rapid advancement of wireless communication is forming a hyper-connected 5G network in which billions of linked devices generate massive amounts of data. The traffic control and data forwarding functions are decoupled in software-defined networking (SDN) and allow the network to be programmable. Each switch in SDN keeps track of forwarding information in a flow table. The SDN switches must search the flow table for the flow rules that match the packets to handle the incoming packets. Due to the obvious vast quantity of data in data centres, the capacity of the flow table restricts… More >

  • Open Access

    ARTICLE

    Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller

    Mohammad Adnan Aladaileh, Mohammed Anbar*, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, Shadi Al-Sarawn

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1403-1416, 2022, DOI:10.32604/cmc.2022.029369 - 18 May 2022

    Abstract The emergence of a new network architecture, known as Software Defined Networking (SDN), in the last two decades has overcome some drawbacks of traditional networks in terms of performance, scalability, reliability, security, and network management. However, the SDN is vulnerable to security threats that target its controller, such as low-rate Distributed Denial of Service (DDoS) attacks, The low-rate DDoS attack is one of the most prevalent attacks that poses a severe threat to SDN network security because the controller is a vital architecture component. Therefore, there is an urgent need to propose a detection approach… More >

Displaying 1-10 on page 1 of 24. Per Page