Duo: Software Defined Intrusion Tolerant System Using Dual Cluster

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Machine Learning Based Intrusion Detection System for Software Defined

As an inevitable trend of future 5G networks, Software Defined architecture has many advantages in providing centralized control and flexible resource management. But it is also confronted with various security challenges and potential threats with emerging services and technologies. As the focus of network security, Intrusion Detection Systems (IDS) are usually deployed separately without coll...

متن کامل

A Review of Intrusion Detection Defense Solutions Based on Software Defined Network

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

متن کامل

Controller Placement in Software Defined Network using Iterated Local Search

Software defined network is a new computer network architecture who separates controller and data layer in network devices such as switches and routers. By the emerge of software defined networks, a class of location problems, called controller placement problem, has attracted much more research attention. The task in the problem is to simultaneously find optimal number and location of controll...

متن کامل

Dual-structure Data Center Multicast Using Software Defined Networking

Data center applications use multicast as an effective method to reduce bandwidth cost. However, traditional multicast protocols designed for IP networks are usually bottlenecked by the limited state capacity on switches. In this paper, we propose a scalable multicast solution on fat tree networks based on the observation that data center multicast traffic has strong heterogeneity. We propose t...

متن کامل

Design of an Intrusion-Tolerant Intrusion Detection System

The goal of this document is to help users designing intrusion-detection systems (IDSes) that cannot be easily defeated by attackers. Three different sets of issues need to be addressed, namely: 1. Current IDSes are known to generate an extremely large number of false alarms. As a result, the identification of a real alarm lost within the noise of false alarms quickly becomes an infeasible task...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2018

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2018/6751042