Named Data Networking (NDN) is a promising network architecture being considered as a possible replacement for the current IP-based (host-centric) Internet infrastructure. NDN can overcome the fundamental limitations of the current Internet, in particular, Denial-of-Service (DoS) attacks. However, NDN can be subject to new type of DoS attacks namely Interest flooding attacks and content poisoning. These types of attacks exploit key architectural features of NDN. This paper presents a new intelligent hybrid algorithm for proactive detection of DoS attacks and adaptive mitigation reaction in NDN. In the detection phase, a combination of multiobjective evolutionary optimization algorithm with PSO in the context of the RBF neural network has be...
In a world that is becoming increasingly dependent on In- ternet communication, Denial of Service (D...
In spite of extensive research in defence against De- nial of Service (DoS), such attacks remain a p...
AbstractA DoS attack can be regarded as an attempt of attackers to prevent legal users from gaining ...
Named Data Networking (NDN) is a promising network architecture being considered as a possible repla...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
The potential damage to computer networks keeps increasing due to a growing reliance on the Internet...
Abstract—With the growing realization that current Internet protocols are reaching the limits of the...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
Security in wireless frameworks is a significant and difficult task because of the open environment....
One of the most serious threat to network security is Denial of service (D...
Denial of Service (DoS) is a prevalent threat in today’s networks. While such an attack is not diffi...
The growing use of Internet service in the past few years have facilitated an increase in the denial...
Information-Centric Networking (ICN) has recently been considered as a promising paradigm for the ne...
Distributed Denial of Service (DDoS) attacks can put the communication networks in instability by th...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
In a world that is becoming increasingly dependent on In- ternet communication, Denial of Service (D...
In spite of extensive research in defence against De- nial of Service (DoS), such attacks remain a p...
AbstractA DoS attack can be regarded as an attempt of attackers to prevent legal users from gaining ...
Named Data Networking (NDN) is a promising network architecture being considered as a possible repla...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
The potential damage to computer networks keeps increasing due to a growing reliance on the Internet...
Abstract—With the growing realization that current Internet protocols are reaching the limits of the...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
Security in wireless frameworks is a significant and difficult task because of the open environment....
One of the most serious threat to network security is Denial of service (D...
Denial of Service (DoS) is a prevalent threat in today’s networks. While such an attack is not diffi...
The growing use of Internet service in the past few years have facilitated an increase in the denial...
Information-Centric Networking (ICN) has recently been considered as a promising paradigm for the ne...
Distributed Denial of Service (DDoS) attacks can put the communication networks in instability by th...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
In a world that is becoming increasingly dependent on In- ternet communication, Denial of Service (D...
In spite of extensive research in defence against De- nial of Service (DoS), such attacks remain a p...
AbstractA DoS attack can be regarded as an attempt of attackers to prevent legal users from gaining ...