denial of service attacks
Recently Published Documents


TOTAL DOCUMENTS

982
(FIVE YEARS 411)

H-INDEX

45
(FIVE YEARS 18)

2022 ◽  
Vol 2 ◽  
Author(s):  
Jianting Lyu ◽  
Lianghui Sun ◽  
Xin Wang ◽  
Dai Gao

This article focuses on the consensus problem of linear multi-agent systems under denial-of-service attacks and directed switching topologies. With only intermittent communication, the leader-following consensus can be preserved by fully distributed event-triggered strategies. Theoretical analysis shows that the proposed event-triggered resilient controller guarantees the exponential convergence in the presence of denial-of-service attacks and the exclusion of Zeno behavior. Compared to the existing studies where continuous communication between neighboring agents is required, the event-triggered data reduction scheme is provided to tackle the effects of denial-of-service attacks on directed switching topology as well as to avoid continuous communication and reduce energy consumption. The obtained results can be extended to the scenario without a leader. Numerical simulations are finally given to illustrate the effectiveness of the proposed method.


2021 ◽  
Author(s):  
Santosh Mani ◽  
Manisha J Nene

Networks configured in Mesh topology provide Network security in the form of redundancy of communication links. But redundancy also contributes to complexity in configuration and subsequent troubleshooting. Critical networks like Backbone Networks (used in Cloud Computing) deploy the Mesh topology which provides additional security in terms of redundancy to ensure availability of services. Distributed Denial of Service attacks are one of the most prominent attacks that cause an immense amount of loss of data as well as monetary losses to service providers. This paper proposes a method by which using SDN capabilities and sFlow-RT application, Distributed Denial of Service (DDoS) attacks is detected and consequently mitigated by using REST API to implement Policy Based Flow Management through the SDN Controller which will help in ensuring uninterrupted services in scenarios of such attacks and also further simply and enhance the management of Mesh architecture-based networks.


Sign in / Sign up

Export Citation Format

Share Document