메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 9485-9496

A game theoretical based system using holt-winters and genetic algorithm with fuzzy logic for DoS/DDoS mitigation on SDN networks

Author keywords

Denial of service; Fuzzy logic; GADS; Game theory; HWDS

Indexed keywords

COMPUTATION THEORY; COMPUTER CIRCUITS; DECISION MAKING; DECISION THEORY; DENIAL-OF-SERVICE ATTACK; DISTRIBUTED COMPUTER SYSTEMS; GAME THEORY; GENETIC ALGORITHMS; HEURISTIC METHODS; SIGNAL DETECTION;

EID: 85025627122     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2702341     Document Type: Article
Times cited : (63)

References (38)
  • 1
    • 84970046203 scopus 로고    scopus 로고
    • Botnet in DDoS attacks: Trends and challenges
    • 4th Quart
    • N. Hoque, D. K. Bhattacharyya, and J. K. Kalita, "Botnet in DDoS attacks: Trends and challenges," IEEE Commun. Surveys. Tuts., vol. 17, no. 4, pp. 2242-2270, 4th Quart., 2015.
    • (2015) IEEE Commun. Surveys. Tuts , vol.17 , Issue.4 , pp. 2242-2270
    • Hoque, N.1    Bhattacharyya, D.K.2    Kalita, J.K.3
  • 2
    • 84962339713 scopus 로고    scopus 로고
    • Software-De-Ned networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing Environments: A survey, some research issues, and challenges
    • 1st Quart
    • Q. Yan, F. R. Yu, Q. Gong, and J. Li, "Software-de-ned networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges," IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 602-622, 1st Quart., 2016.
    • (2016) IEEE Commun. Surveys Tuts , vol.18 , Issue.1 , pp. 602-622
    • Yan, Q.1    Yu, F.R.2    Gong, Q.3    Li, J.4
  • 3
    • 84964587049 scopus 로고    scopus 로고
    • A survey on OpenFlow-based software de-ned networks: Security challenges and countermeasures
    • Jun.
    • W. Li,W. Meng, and L. F. Kwok, "A survey on OpenFlow-based software de-ned networks: Security challenges and countermeasures," J. Netw. Comput. Appl., vol. 68, pp. 126-139, Jun. 2016.
    • (2016) J. Netw. Comput. Appl , vol.68 , pp. 126-139
    • LiW Meng, W.1    Kwok, L.F.2
  • 7
    • 84904119137 scopus 로고    scopus 로고
    • Wavelet-Based Multi-Scale anomaly identi-cation in cloud computing systems
    • Dec.
    • Q. Guan and S. Fu, "Wavelet-based multi-scale anomaly identi-cation in cloud computing systems," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 1379-1384.
    • (2013) Proc. IEEE Global Commun. Conf. (GLOBECOM) , pp. 1379-1384
    • Guan, Q.1    Fu, S.2
  • 9
    • 84901825380 scopus 로고    scopus 로고
    • A sevendimensional-ow analysis to help autonomous network management
    • Sep.
    • M. V. O. de Assis, J. J. P. C. Rodrigues, and M. L. Proencą, Jr., "A sevendimensional-ow analysis to help autonomous network management," Inf. Sci., vol. 278, pp. 900-913, Sep. 2014.
    • (2014) Inf. Sci , vol.278 , pp. 900-913
    • De Assis, M.V.O.1    Rodrigues, J.J.P.C.2    Proencą, M.L.3
  • 10
    • 84964374650 scopus 로고    scopus 로고
    • SD-Anti-DDoS: Fast and ef-cient DDoS defense in software-de-ned networks
    • Jun.
    • Y. Cui et al., "SD-Anti-DDoS: Fast and ef-cient DDoS defense in software-de-ned networks," J. Netw. Comput. Appl., vol. 68, pp. 65-79, Jun. 2016.
    • (2016) J. Netw. Comput. Appl , vol.68 , pp. 65-79
    • Cui, Y.1
  • 11
    • 84897109717 scopus 로고    scopus 로고
    • Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
    • Apr.
    • K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments," Comput. Netw., vol. 62, pp. 122-136, Apr. 2014.
    • (2014) Comput. Netw , vol.62 , pp. 122-136
    • Giotis, K.1    Argyropoulos, C.2    Androulidakis, G.3    Kalogeras, D.4    Maglaris, V.5
  • 12
  • 13
    • 67249152333 scopus 로고    scopus 로고
    • Game theoretic solutions for precoding strategies over the interference channel
    • Nov.
    • J. Gao, S. A. Vorobyov, and H. Jiang, "Game theoretic solutions for precoding strategies over the interference channel," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Nov. 2008, pp. 1-5.
    • (2008) Proc. IEEE Global Telecommun. Conf. (GLOBECOM) , pp. 1-5
    • Gao, J.1    Vorobyov, S.A.2    Jiang, H.3
  • 14
    • 84877645855 scopus 로고    scopus 로고
    • Game theory based resource allocation for cognitive radio networks
    • Dec.
    • O. E. Ferkouss and W. Ajib, "Game theory based resource allocation for cognitive radio networks," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2012, pp. 1174-1179.
    • (2012) Proc. IEEE Global Commun. Conf. (GLOBECOM) , pp. 1174-1179
    • Ferkouss, O.E.1    Ajib, W.2
  • 15
    • 84906991657 scopus 로고    scopus 로고
    • Game-based adaptive security in the Internet of Things for eHealth
    • Jun.
    • M. Hamdi and H. Abie, "Game-based adaptive security in the Internet of Things for eHealth," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 920-925.
    • (2014) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 920-925
    • Hamdi, M.1    Abie, H.2
  • 16
    • 84946412609 scopus 로고    scopus 로고
    • Scorpius: SFlow network anomaly simulator
    • Apr.
    • M. V. O. de Assis and M. L. Proencą, Jr., "Scorpius: SFlow network anomaly simulator," J. Comput. Sci., vol. 11, no. 4, pp. 662-674, Apr. 2015.
    • (2015) J. Comput. Sci , vol.11 , Issue.4 , pp. 662-674
    • De Assis, M.V.O.1    Proencą, M.L.2
  • 18
    • 84955178164 scopus 로고    scopus 로고
    • Interfunction anomaly analysis for correct SDN/NFV deployment
    • Jan.
    • C. Basile, D. Canavese, A. Lioy, C. Pitscheider, and F. Valenza, "Interfunction anomaly analysis for correct SDN/NFV deployment," Int. J. Netw. Manage., vol. 26, no. 1, pp. 25-43, Jan. 2016.
    • (2016) Int. J. Netw. Manage , vol.26 , Issue.1 , pp. 25-43
    • Basile, C.1    Canavese, D.2    Lioy, A.3    Pitscheider, C.4    Valenza, F.5
  • 19
    • 84959889541 scopus 로고    scopus 로고
    • Dynamic control plane management for software-de-ned networks
    • Mar.
    • J. Li, J.-H. Yoo, and J.W.-K. Hong, "Dynamic control plane management for software-de-ned networks," Int. J. Netw. Manage., vol. 26, no. 2, pp. 111-130, Mar. 2016.
    • (2016) Int. J. Netw. Manage , vol.26 , Issue.2 , pp. 111-130
    • Li, J.1    Yoo, J.-H.2    Hong, J.W.-K.3
  • 20
    • 85020922710 scopus 로고    scopus 로고
    • Control path management framework for enhancing software-de-ned network (SDN) reliability
    • to be published
    • S. Song, H. Park, B.-Y. Choi, T. Choi, and H. Zhu, "Control path management framework for enhancing software-de-ned network (SDN) reliability," IEEE Trans. Netw. Ser. Manage., to be published, doi: 10.1109/TNSM.2017.2669082.
    • IEEE Trans. Netw. Ser. Manage
    • Song, S.1    Park, H.2    Choi, B.-Y.3    Choi, T.4    Zhu, H.5
  • 22
    • 84891816613 scopus 로고    scopus 로고
    • A system for denial-of-service attack detection based on multivariate correlation analysis
    • Feb.
    • Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, "A system for denial-of-service attack detection based on multivariate correlation analysis," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 447-456, Feb. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.2 , pp. 447-456
    • Tan, Z.1    Jamdagni, A.2    He, X.3    Nanda, P.4    Liu, R.P.5
  • 23
    • 20344364652 scopus 로고    scopus 로고
    • Denial of service attacks on networkbased control systems: Impact and mitigation
    • May
    • M. Long, C.-H.Wu, and J. Y. Hung, "Denial of service attacks on networkbased control systems: Impact and mitigation," IEEE Trans Ind. Informat., vol. 1, no. 2, pp. 85-96, May 2005.
    • (2005) IEEE Trans Ind. Informat , vol.1 , Issue.2 , pp. 85-96
    • Long, M.1    Wu, C.-H.2    Hung, J.Y.3
  • 24
    • 84958166080 scopus 로고    scopus 로고
    • Unsupervised learning clustering and self-organized agents applied to help network management
    • Jul.
    • L. F. Carvalho, S. Barbon, Jr., L. S. de Mendes, and M. L. Proencą, Jr., "Unsupervised learning clustering and self-organized agents applied to help network management," Expert Syst. Appl., vol. 54, pp. 29-47, Jul. 2016.
    • (2016) Expert Syst. Appl , vol.54 , pp. 29-47
    • Carvalho, L.F.1
  • 25
    • 84954438979 scopus 로고    scopus 로고
    • On network operating system security
    • Jan.
    • C. Röpke and T. Holz, "On network operating system security," Networks, vol. 26, no. 1, pp. 6-24, Jan. 2016.
    • (2016) Networks , vol.26 , Issue.1 , pp. 6-24
    • Röpke, C.1    Holz, T.2
  • 26
    • 84963935825 scopus 로고    scopus 로고
    • OpenSec: Policy-based security using software-de-ned networking
    • Mar.
    • A. Lara and B. Ramamurthy, "OpenSec: Policy-based security using software-de-ned networking," IEEE Trans. Netw. Ser. Manage., vol. 13, no. 1, pp. 30-42, Mar. 2016.
    • (2016) IEEE Trans. Netw. Ser. Manage , vol.13 , Issue.1 , pp. 30-42
    • Lara, A.1    Ramamurthy, B.2
  • 27
    • 84894235329 scopus 로고    scopus 로고
    • Game theory applied to big data analytics in geosciences and remote sensing
    • Jul.
    • L. M. Bruce, "Game theory applied to big data analytics in geosciences and remote sensing," in Proc. IEEE Int. Geosci. Remote Sens. Symp. (IGARSS), Jul. 2013, pp. 4094-4097.
    • (2013) Proc. IEEE Int. Geosci. Remote Sens. Symp. (IGARSS) , pp. 4094-4097
    • Bruce, L.M.1
  • 28
    • 78650626363 scopus 로고    scopus 로고
    • On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
    • San Diego, CA, USA
    • Q. Wu, S. Shiva, S. Roy, C. Ellis, and V. Datla, "On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks," in Proc. Spring Simul. Multiconf., San Diego, CA, USA, 2010, pp. 159:1-159:8.
    • (2010) Proc. Spring Simul. Multiconf , pp. 1591-1598
    • Wu, Q.1    Shiva, S.2    Roy, S.3    Ellis, C.4    Datla, V.5
  • 29
    • 79961201214 scopus 로고    scopus 로고
    • Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly-ows
    • Apr.
    • H. S. Bedi, S. Roy, and S. Shiva, "Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly-ows," in Proc. IEEE Symp. Comput. Intell. Cyber Secur. (CICS), Apr. 2011, pp. 129-136.
    • (2011) Proc. IEEE Symp. Comput. Intell. Cyber Secur. (CICS) , pp. 129-136
    • Bedi, H.S.1    Roy, S.2    Shiva, S.3
  • 34
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • Jan.
    • S. X. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Appl. Soft Comput., vol. 10, no. 1, pp. 1-35, Jan. 2010.
    • (2010) Appl. Soft Comput , vol.10 , Issue.1 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 36
    • 83755179025 scopus 로고    scopus 로고
    • Comparison analysis of statistical control charts for quality monitoring of network traf-c forecasts
    • Oct.
    • R. Matias, A. M. M. Carvalho, L. B. Araujo, and P. R. M. Maciel, "Comparison analysis of statistical control charts for quality monitoring of network traf-c forecasts," in Proc. IEEE Int. Conf. Syst., Man, Cybern., Oct. 2011, pp. 404-409.
    • (2011) Proc. IEEE Int. Conf. Syst., Man, Cybern , pp. 404-409
    • Matias, R.1    Carvalho, A.M.M.2    Araujo, L.B.3    MacIel, P.R.M.4
  • 38
    • 0002021736 scopus 로고
    • Equilibrium points in n-person games
    • J. F. Nash, Jr., "Equilibrium points in n-person games," Proc. Nat. Acad. Sci. USA, vol. 36, no. 1, pp. 48-49, 1950.
    • (1950) Proc. Nat. Acad. Sci. USA , vol.36 , Issue.1 , pp. 48-49
    • Nash, Jr.J.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.