Novel Firewall Application for Mitigating Flooding Attacks on an SDN Network

Author(s):  
Yubaraj Gautam ◽  
Kazuhiko Sato ◽  
Bishnu Prasad Gautam ◽  
Norio Shiratori
Keyword(s):  
2002 ◽  
Author(s):  
Ranga S. Ramanujan ◽  
Doug Harper ◽  
Maher Kaddoura ◽  
David Baca ◽  
John Wu ◽  
...  

2021 ◽  
Vol 8 (1) ◽  
pp. 751-764
Author(s):  
Abdullah Aydeger ◽  
Mohammad Hossein Manshaei ◽  
Mohammad Ashiqur Rahman ◽  
Kemal Akkaya

Author(s):  
Xu Chen ◽  
Wei Feng ◽  
Yantian Luo ◽  
Meng Shen ◽  
Ning Ge ◽  
...  

Author(s):  
Jiahao Peng ◽  
Xiaobo Ma ◽  
Jianfeng Li ◽  
Lei Xue ◽  
Wenjun Hu
Keyword(s):  

In this paper we attempt to address Inter-Host Docker container communications security issues by incorporating a latest approach provided by Vault Hashicorp dynamic secret mechanism for managing SSH keys and server credentials. A simulation environment is prepared for Inter-Host container communication consisting of one host running locally and the peer host running as an AWS EC2 instance in cloud. Industry standard monitoring tool Grafana is used in the simulation environment to highlight the security impacts for any organization. We also draw special attention to some of the security vulnerabilities in docker container like ARP spoofing, Integrity of the docker host and containers and MAC flooding attacks. We try to list some best practices to be followed when using docker containers in any production deployments.


Author(s):  
Andy Hidayat Jatmika ◽  
I Made Windra Yudistiana ◽  
Ariyan Zubaidi

One sector that greatly influences it is in terms of network security. This is due to the characteristics of the MANET network that are dynamic so that the MANET network is very easily disturbed by irresponsible parties. One of the attacks that can occur in MANET network is Route Request (RREQ) Flooding Attacks. In RREQ flooding attacks in the form of fake nodes that are outside the area of the network and broadcast RREQ to the destination node in the network, so that it meets the bandwidth capacity which results in a decrease in quality in determining the route of sending data or information to the destination node. To prevent the occurrence of RREQ flooding attacks, a prevention method for these attacks is required, namely the RREQ Flooding Attacks Prevention (RFAP). This method works by finding nodes that are likely to be malicious nodes then isolated from the network to be restored to normal nodes. This research will optimize the AODV and AOMDV routing protocols by adding RFAP prevention methods and knowing the performance of the two protocols in terms of throughput, average end-to-end delay and normalized routing load. Based on the results of the simulation, that the application of the method RFAP on AODV routing protocol can produce network quality is better than AOMDV protocol, both in terms of throughput, average end-to-end delay and normalized routing load.


Sign in / Sign up

Export Citation Format

Share Document