Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification
Scientific Reports,
Год журнала:
2023,
Номер
13(1)
Опубликована: Окт. 13, 2023
Software-defined
networking
(SDN)
has
significantly
transformed
the
field
of
network
management
through
consolidation
control
and
provision
enhanced
adaptability.
However,
this
paradigm
shift
concurrently
presented
novel
security
concerns.
The
preservation
service
path
integrity
holds
significant
importance
within
SDN
environments
due
to
potential
for
malevolent
entities
exploit
flows,
resulting
in
a
range
breaches.
This
research
paper
introduces
model
called
"EnsureS",
which
aims
enhance
by
proposing
an
efficient
secure
validation
approach.
proposed
approach
utilizes
Lightweight
Service
Path
Validation
using
Batch
Hashing
Tag
Verification,
focusing
on
improving
validation's
efficiency
environments.
EnsureS
system
two
primary
techniques
order
validate
pathways
efficiently.
Firstly,
method
batch
hashing
minimize
computational
overhead.
algorithm
enhances
performance
aggregating
packets
batches
rather
than
independently;
process
takes
place
each
one
pathway.
Additionally,
implementation
tag
verification
enables
devices
efficiently
verify
authenticity
leveraging
pre-established
trust
relationships.
provides
streamlined
effective
validating
paths
integrating
these
methodologies.
In
assess
efficacy
Proposed
EnsureS,
comprehensive
series
investigations
were
conducted
simulated
circumstance.
was
then
compared
that
established
methods.
findings
our
study
indicate
solution
effectively
minimizes
overhead
without
compromising
standards.
successfully
reduces
impact
different
types
attacks,
such
as
route
alteration
packet
spoofing,
increasing
networks'
general
integrity.
Язык: Английский
Exploring the landscape of software defined networking: A comprehensive survey of applications, challenges, and future directions
AIP conference proceedings,
Год журнала:
2025,
Номер
3224, С. 030018 - 030018
Опубликована: Янв. 1, 2025
Язык: Английский
Detection and Analysis of Active Attacks using Honeypot
Waqas Ahmad,
Muhammad Arsalan Raza,
Sabreena Nawaz
и другие.
International Journal of Computer Applications,
Год журнала:
2023,
Номер
184(50), С. 27 - 31
Опубликована: Март 22, 2023
Honeypots
are
computer
systems
specifically
deployed
to
deceive
attackers
so
that
they
consider
them
legitimate
computers.Honeypots
actually
a
trap
trick
the
we
can
learn
about
their
behavior
and
attack
methods
use.Security
experts
collect
all
relevant
information
techniques
take
firm
actions
strengthen
security
measures.Although
another
technique
is
also
being
used
which
Intrusion
Detection
Prevention
System
(IDPS),
but
it
generates
false
positives
negatives,
limitation
of
IDPS.Therefore,
know
behavior,
methods,
techniques,
signatures
an
attacker,
Dionaea
honeypot
system
regarding
cyber-attacks,
proving
more
useful
way
rather
than
previous
traditional
methods.Attacks
were
captured
by
software
reveal
source
IP
addresses
target
host
became
victim
attacks.
Язык: Английский
Organizational information security threats: Status and challenges
World Journal of Advanced Engineering Technology and Sciences,
Год журнала:
2024,
Номер
11(1), С. 148 - 162
Опубликована: Фев. 11, 2024
Organizational
information
security
is
a
critical
concern
in
today’s
interconnected
and
data-driven
world.
With
the
increasing
frequency
sophistication
of
cyber
threats,
organizations
face
significant
risks
to
confidentiality,
integrity,
availability
their
sensitive
information.
This
paper
provides
an
overview
key
aspects
challenges
related
organizational
security.
It
highlights
importance
implementing
robust
measures,
such
as
firewalls,
intrusion
detection
systems,
encryption
technologies,
secure
coding
practices,
protect
against
external
threats.
also
demonstrates
need
for
continuous
monitoring,
threat
intelligence
sharing,
incident
response
capabilities
detect
respond
incidents
effectively.
survey
shows
user
awareness,
training,
adherence
policies
procedures.
In
addition,
significance
establishing
security-centric
culture
within
mitigate
risk
insider
threats
promote
strong
posture
discussed.
The
evolving
landscape,
including
associated
with
advanced
persistent
zero-day
vulnerabilities,
emerging
technologies
IoT
AI
are
highlighted,
together
ongoing
research
innovation
address
these
enhance
effectiveness
preventive
measures.
Язык: Английский
An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets
Computers,
Год журнала:
2023,
Номер
12(10), С. 202 - 202
Опубликована: Окт. 8, 2023
Due
to
the
Internet’s
explosive
growth,
network
security
is
now
a
major
concern;
as
result,
tracking
traffic
essential
for
variety
of
uses,
including
improving
system
efficiency,
fixing
bugs
in
network,
and
keeping
sensitive
data
secure.
Firewalls
are
crucial
component
enterprise-wide
architectures
because
they
protect
individual
networks
from
intrusion.
The
efficiency
firewall
can
be
negatively
impacted
by
issues
with
its
design,
configuration,
monitoring,
administration.
Recent
methods
do
not
have
rigor
manage
vagueness
that
comes
filtering
packets
exterior.
Knowledge
representation
reasoning
two
areas
where
fuzzy
Petri
nets
(FPNs)
receive
extensive
usage
modeling
tool.
Despite
their
widespread
success,
FPNs’
limitations
engineering
field
stem
fact
it
difficult
represent
different
kinds
uncertainty.
This
article
details
construction
novel
packet-filtering
model
addresses
current
FPN-based
methods.
primary
contribution
employ
Simplified
Neutrosophic
(SNPNs)
tool
discrete
event
systems
area
packet
characterized
imprecise
knowledge.
Because
SNPNs’
symbolic
ability,
filtration
quickly
easily
established,
examined,
enhanced,
maintained.
Based
on
idea
ambiguity
packet’s
movement
described
if–then
production
rules
realized
truth-membership
function,
indeterminacy-membership
falsity-membership
functional,
we
adopt
neutrosophic
logic
modelling
PN
transition
objects.
In
addition,
simulate
dynamic
behavior
light
inherent
presenting
two-level
method
improve
ranking
list.
Results
experiments
local
back
up
efficacy
proposed
illustrate
how
increase
firewall’s
susceptibility
threats
posed
traffic.
Язык: Английский
Exploring SDN Based Firewall and NAPT: A Comparative Analysis with Iptables and OVS in Mininet
Md Fahad Monir,
Azwad Fawad Hasan
Lecture notes on data engineering and communications technologies,
Год журнала:
2024,
Номер
unknown, С. 436 - 447
Опубликована: Янв. 1, 2024
Язык: Английский
Developing the Role of Firewalls in Enhancing Web Security for Wireless Networks
Ritushree Narayan,
N. V. Balaji,
G Kalanandhini
и другие.
Опубликована: Дек. 29, 2023
Firewalls
play
a
critical
role
in
controlling
incoming
and
outgoing
community
site
visitors
shielding
wireless
network
from
malicious
assaults.
This
technical
summary
focuses
on
the
development
of
firewalls
as
way
to
beautify
internet
safety
for
Wi-Fi
networks.
Contemporary
networks
are
increasingly
more
vulnerable
cyber-attacks.
one
simplest
strategies
safety,
able
restricting
among
or
net.
They
also
can
be
used
come
across
perceive
pastime.
The
has
improved
at
fast
pace
current
years.
New
functions
along
with
Intrusion
Detection
Prevention
systems
(IDS/IPS),
URL
filtering,
virus
scanning,
user
authentication,
application
layer
have
vastly
advanced
effectiveness
firewalls.
Advanced
such
deploy
Rector
Reactive
tracking
(IRM),
get
right
entry
manage
(NAC)
getting
detect
suspicious
requests
put
into
effect
coverage.
NAC
may
both
control
admission
resources,
respond
visitors.
enhanced
protection
supplied
by
is
useful
home
employer
Via
implementing
those
capabilities,
organizations
lessen
danger
cyberattacks
guard
their
resources.
Язык: Английский