The continual growth of network traffic rates leads to heavy packet processing overheads, and a typical solution is to partition traffic into multiple network processors for parallel processing especially in emerging software-defined networks. This paper is thus motivated to propose a robust dynamic network traffic partitioning scheme to defend against malicious attacks. After introducing the conceptual framework of dynamic network traffic partitioning based on flow tables, we strengthen its TCP connection management by building a half-open connection separation mechanism to isolate false connections in the initial connection table (ICT). Then, the lookup performance of the ICT table is reinforced by applying counting bloom filters to cope ...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
DDoS presents a genuine risk to the Internet since its beginning, where loads of controlled hosts su...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
As networks become faster there is an emerging need for security analysis techniques that can keep u...
This paper presents and experimentally evaluates two parallelization strategies for the popular open...
The threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, sp...
Most network intrusion tools (e.g., Bro) use per-flow state to reassemble TCP connections and fragme...
Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such ...
YesWith the rapid growth of security threats in computer networks, the need for developing efficient...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
AbstractIn application-layer distributed denial of service (DDoS) attacks, zombie machines attack th...
This study proposes a capable, scalable, and reliable edge-to-edge model for filtering malicious tra...
Denial-of-service (DoS) is one of the major network security threats. While network-DoS (N-DoS) inci...
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
DDoS presents a genuine risk to the Internet since its beginning, where loads of controlled hosts su...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
As networks become faster there is an emerging need for security analysis techniques that can keep u...
This paper presents and experimentally evaluates two parallelization strategies for the popular open...
The threat of malicious Internet activities such as Distributed Denial of Service (DDoS) attacks, sp...
Most network intrusion tools (e.g., Bro) use per-flow state to reassemble TCP connections and fragme...
Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such ...
YesWith the rapid growth of security threats in computer networks, the need for developing efficient...
Nowadays, computer networks have become incredibly complex due to the evolution of online services a...
AbstractIn application-layer distributed denial of service (DDoS) attacks, zombie machines attack th...
This study proposes a capable, scalable, and reliable edge-to-edge model for filtering malicious tra...
Denial-of-service (DoS) is one of the major network security threats. While network-DoS (N-DoS) inci...
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
DDoS presents a genuine risk to the Internet since its beginning, where loads of controlled hosts su...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...