Search Results/Filters    

Filters

Year

Banks




Expert Group










Full-Text


Author(s): 

JALILI AHMAD

Issue Info: 
  • Year: 

    2019
  • Volume: 

    10
  • Issue: 

    1
  • Pages: 

    177-183
Measures: 
  • Citations: 

    0
  • Views: 

    137
  • Downloads: 

    103
Abstract: 

Nowadays wireless Networks are becoming important in personal and public communication and growing very rapidly. Similarly, Software De ned Network ((SDN)) is an emerging approach to over-come challenges of traditional Networks. In this paper, a new (SDN)-based framework is proposed to ne-grained control of 802. 11 Wireless LANs. This work describes the bene ts of programmable Access Points. The proposed framework is evaluated on a prototype. We show that this architecture allows us to react to application needs, adjust network con guration for a priority application, detect network problems, and improve the user experience of the network. Our architecture relies on the IEEE 802. 11 standard, and exploits it to collect information from the stations.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 137

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 103 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

Teymurzade Yaser

Issue Info: 
  • Year: 

    2017
  • Volume: 

    3
Measures: 
  • Views: 

    204
  • Downloads: 

    0
Abstract: 

TRADITIONAL IP Networks ARE VERY COMPLEX AND HARD TO MANGE. IMPLEMENTING NETWORK ACCORDING TO PREDEFINED POLICIES AND RECONFIGURE IT TO RESPOND TO FAULTS ARE CUMBERSOME. FURTHERMORE, CONTROL AND DATA LAYERS ARE BUNDLED TOGETHER. SOFTWARE DEFINED Networks ((SDN)) ARE AN EMERGING PARADIGM THAT SEPARATE DATA LAYER FROM CONTROL LAYER AND BRING PROGAMMABILITY TO Networks. ALTHOUGH (SDN)S HAVE MANY ADVANTAGES AT NETWORK PROGRAMMABILITY, ENFORCING POLICES AND CONTOLING Networks, BUT THEY HAVE DIFFERENT SECURITY CHALLENGES AND PROBLEMS. IN THIS ARTICLE, SECURITY ISSUES THAT ARE DIRECTLY RELATED TO (SDN) ARE CATEGORIZED TO SEVEN DIFFERENT CATEGORIES: UNATHURIZED ACCESS, DATA LEAKAGE, DATA MODIFICATION, MALICIOUS/COMPORMISED APPLICATION, DENIAL OF SERVICE, CONFIGURATION ISSUES AND SYSTEM LEVEL (SDN) SECURITY. EACH OF THESE ISSUES AND PROPOSED SOLUTIONS FOR THEM ARE REVIEWED AND FINALLY CONCLUSIONS ARE MADE.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 204

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    21
  • Issue: 

    4
  • Pages: 

    242-252
Measures: 
  • Citations: 

    0
  • Views: 

    140
  • Downloads: 

    19
Abstract: 

The rise of Software-Defined Networking ((SDN)) has revolutionized network management, offering greater flexibility and programmability. However, ensuring the accuracy of packet forwarding remains paramount for maintaining network reliability and security in (SDN) environments. Unlike traditional IP Networks, (SDN) separates the control plane from the data plane, creating new challenges for securing data transmission. Existing verification methods designed for IP Networks often cannot be directly applied to (SDN) due to this architectural difference. To address the limitations of existing verification methods in (SDN) Networks, new approaches are necessary. This research proposes a novel parallel method for verifying packet forwarding, building upon concepts from DYNAPFV. The proposed approach aims to overcome specific limitations of existing methods (including DYNAPFV), such as scalability issues, slow verification times. Simulations demonstrate significant improvements compared to DYNAPFV. The proposed parallel method achieves a 92% reduction in time required to identify malicious nodes within the network. The results also reveal a trade-off between security and verification time. As the probability of packet integrity confirmation increases from 0. 8 to 0. 99, system security strengthens, but the time to detect malicious switches also increases.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 140

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 19 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    21
  • Issue: 

    2
  • Pages: 

    111-119
Measures: 
  • Citations: 

    0
  • Views: 

    311
  • Downloads: 

    44
Abstract: 

Internet of Things (IoT) is a network of objects on which objects can communicate with other objects. The Internet of Things is currently constantly under numerous attacks due to technical, legal and human problems. One of the most important of these attacks is the Denial of Service (DoS) attack, in which normal network services are out of service and it is impossible for objects and users to access the server and other resources. Existing security solutions have not been able to effectively prevent interruption attacks in Internet of Things services. Software-oriented network ((SDN)) is a new architecture in the network based on the separation of the control and data plane of the network. Programmability and network management capability by (SDN) can be used in IoT services because some IoT devices send data periodically and in certain time intervals. (SDN) can help reduce or prevent the data flood caused by IoT if properly deployed in the data center. In this article, a method to detect DDoS attacks in Internet of Things based on (SDN) is presented and then an algorithm to reduce DDoS attacks is presented. The proposed method is based on the entropy criterion, which is one of the most important concepts in information theory and is calculated based on the characteristics of the flow. In this method, by using two new components on the controller to receive incoming packets and considering the time window and calculating entropy and flow rate, a possible attack is detected in the network, and then based on the statistics of the flow received from the switches, the certainty of the attack is determined. Compared to the existing methods, the proposed method has improved 12% in terms of attack detection time and 26% in terms of false positives/negatives.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 311

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 44 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    52
  • Issue: 

    4
  • Pages: 

    269-280
Measures: 
  • Citations: 

    0
  • Views: 

    142
  • Downloads: 

    12
Abstract: 

One of the obvious reasons for most disorders in network service provisioning is network path congestion. Congestion avoidance in today's Networks is too costly and sometimes impossible. With the introduction of (SDN), centralizing the equipment's control plane has become possible. This paper presents an enhanced method named ESV-DBRA to avoid congestion in multi-tenant (SDN) Networks. At first, ESV-DBRA monitors the traffic load and delay of all network paths for each tenant individually. Then, by merging the parameters obtained from the monitoring, the Service Level Agreements (SLA), and a novel proposed cost function, it calculates the cost of the network paths per tenant. As a result, traffic for each tenant is routed through the path/paths at the lowest possible cost from the tenant's perspective. Next, the bandwidth quotas will be calculated and assigned to the tenants over their optimal routes. Afterward, whenever congestion is likely to occur in a path, ESV-DBRA automatically changes the route or bandwidth of the tenants' traffic related to this path to avoid congestion. Related algorithms are also proposed.Eventually, simulations show that the proposed method effectively increases bandwidth utilization by 10.76%.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 142

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 12 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

naser movahedinia naser movahedinia | khayyambashi mohammad reza | movahedinia naser

Issue Info: 
  • Year: 

    2023
  • Volume: 

    20
  • Issue: 

    3
  • Pages: 

    117-124
Measures: 
  • Citations: 

    0
  • Views: 

    24
  • Downloads: 

    0
Abstract: 

Nowadays is era of Internet of Things. Load balancing is an important studying issues in internet of things that intended to improving energy consuming with distributing loads. The IoT needs load distribution because of the use of Wireless Sensor Networks (WSN) as one of the most well-known IoT connection participators. Improved routing in network is one of methods of load distributing and balancing energy consuming. Software Defined Network ((SDN)) is a new network architecture with could reach this goal, using central controller. In this paper balanced routing based on Leach is presented, which is one of important routings in wireless network. Proposed algorithm is done using direct monitoring of information of load of link and the running situation. This routing named (SDN)-Improved LEACH which can send different flows to BS with the best route. In this routing, using the proposed new controller architecture and defining different layers and units for it, optimal routing for current transmission is considered. This routing directs packets from one source to another according to network conditions. At the end, proposed routing is compared with leach and improved leach algorithms which are some of important routings considering different parameters. Comparisons is done in the number of live nodes, mean consumed energy, receiving data and number of lost packets. comparing diagrams are drowning at the end of paper that indicates predominance of proposed algorithm in compare of those two algorithms.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 24

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Mohammadifar R. | REZAEI A.A.

Issue Info: 
  • Year: 

    2017
  • Volume: 

    4
  • Issue: 

    4 (16)
  • Pages: 

    63-78
Measures: 
  • Citations: 

    0
  • Views: 

    1217
  • Downloads: 

    0
Abstract: 

Flood attacks are among the most devastating distributed denial of service (DDoS) attacks. In these attacks, attackers try to use up resources by sending massive floods of packets in order to seriously challenge the provision of services. Hierarchical architecture and numerous weaknesses in the structure of communication protocols in conventional Networks lead to the fact that firewalls cannot provide an integrated and effective mechanism against these attacks. With the emergence of Software Defined networking ((SDN)), there are new prospects for solving structural and security problems in Traditional Networks. In this paper, a heterogeneous method proposed based on cooperation between traditional service provider and software-based controller ((SDN)) to deal with flooding attacks. In this method, the attack detection module is located in servers and the call module is located in controller((SDN)). In order to simulate the heterogeneous method the MiniNet emulator is used in combination with the Pox controller. Next, the simulated model is evaluated and it is finally concluded that besides protecting against attacks in conventional Networks, the proposed method provides other benefits including the extent of computational load and the response time compared to other Software Defined methods.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1217

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SASAN ZEYNAB | SALEHI MAJID

Issue Info: 
  • Year: 

    2017
  • Volume: 

    8
  • Issue: 

    2 (28)
  • Pages: 

    95-103
Measures: 
  • Citations: 

    0
  • Views: 

    368
  • Downloads: 

    156
Abstract: 

In the field of computer Networks, the introduction of (SDN) has been associated with new concepts. In (SDN) Networks, control plane is separated from the data palne. Traditional Networks suffer from difficult configuration and management. In other words, a change in the network needs to be configured on the whole equipment. With the introduction of (SDN), various modules can be designed and run in controller in order to perform expected policies and rules on all switches. One of the areas of network management is to deal with cyber-attacks. In (SDN) Networks, security modules can be designed to run in the controller and generate rules on switches. Due to the importance of intranets, this paper aimed to detect and prevent ARP poisoning attack on LAN. The tests in a LAN showed that the module can detect the ARP poisoning attack and block the attacker operation.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 368

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 156 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Salehi Shahab | Farbeh Hamed

Issue Info: 
  • Year: 

    2021
  • Volume: 

    10
  • Issue: 

    2
  • Pages: 

    27-38
Measures: 
  • Citations: 

    0
  • Views: 

    128
  • Downloads: 

    49
Abstract: 

Not long ago, the only things connected to the Internet were Personal Computers, while nowadays everything are connected to the Internet from clothes to kitchen appliances. Therefore, Internet of Things (IoT) is more pervasive today. IoT nodes should be able to continue their activities for a long period of time using only their batteries without recharging. IoT is a heterogeneous network and each of its equipment developed independently with difference technologies. Given these properties, IoT typically is relied on the battery. Moreover, it faces with energy constraints because of the limited batteries capacity. In this paper, by considering Internet of Things properties, we propose a novel data encoding method to reduce energy consumption and increase battery via reducing the amount of transmitted data over the network. Moreover, we further reduce the energy consumption by taking the advantages of Software-Defined Networking ((SDN)). The results show that energy consumption is reduced 20%, on average without using (SDN) and 39% in our (SDN)-based system.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 128

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 49 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MUNASINGHE K.S.

Journal: 

IEEE NETWORK

Issue Info: 
  • Year: 

    2017
  • Volume: 

    31
  • Issue: 

    3
  • Pages: 

    56-62
Measures: 
  • Citations: 

    1
  • Views: 

    121
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 121

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button