The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Flexibility and extendibility of Software Defined Networks allows development of diverse network management and flow monitoring techniques. Yet, there are inherent tradeoffs between the quality of flow monitoring and the required network resources. In particular, collecting flow statistics, at the level of specific source-destination addresses (and, moreover, specific protocols and ports), requires...
In this paper, we propose two simple and practically feasible countermeasures to address the Route Spoofing and Resource Exhaustion attacks in Software Defined Networking (SDN) scenarios. For Route Spoofing attack, we introduce a new technique called “selective blocking” which blocks an adversary node to use a genuine user's active routes, and for Resource Exhaustion attack, we propose a “periodic...
Software-Defined Networking (SDN) allows for fast reactions to security threats by dynamically enforcing simple forwarding rules as counter-measures. However, in classic SDN all the intelligence resides at the controller, with the switches only capable of performing stateless forwarding as ruled by the controller. It follows that the controller, in addition to network management and control duties,...
Information-Centric Networking (ICN) has emerged as an interesting approach to overcome many of the limitations of legacy IP-based networks. However, the drastic changes to legacy infrastructure required to realise an ICN have significantly hindered its adoption by network operators. As a result, alternative deployment strategies are investigated, with Software-Defined Networking (SDN) arising as...
Software Defined Network (SDN) is an emerging networking paradigm that has gained enormous attention from the industries as well as the research community. SDN decouples data plane and control plane. The direct programmability of the control plane allows us to develop routing algorithms, which can accommodate versatile requirements of diverse network applications. On another side, Quality-of-Service...
A flow monitoring scheme allows an SDN controller to periodically collect the statistics (e.g., data rates) of all flows in the network. The rate of a flow passing through multiple switches can be collected from any switch along the path. But if a flow only passes through a single switch, i.e., a lonely flow, its flow rate must be collected from that particular switch. While polling a switch for flow...
Recent research demonstrated that software defined networking (SDN) can be leveraged to enable moving target defense (MTD) to mitigate distributed denial of service (DDoS) attacks. The network states are continuously changed in MTD by effectively collecting information from the network and enforcing certain security measures on the fly in order to deceive the attackers. Being motivated from the success...
Software-Defined Networking (SDN) provides a highly flexible flow management platform through a logically centralized controller that exposes network capabilities to the applications. However, most applications do not natively use SDN. An external entity is thus responsible for defining the corresponding flow management policies. Usually network operators prefer to control the flow management policies,...
One electrical fire detector with anti-electromagnetic interference(anti-EMI) is designed in this paper, to solve its deficiency in electromagnetic compatibility (EMC). The design utilizes RN8209G power chip to acquire the signal, and communicates with the host by CAN bus. According to dissemination of electromagnetic interference, the design is divided into hardware and software. In order to raise...
This paper proposes a distributed and autonomous domotics control system architecture. The proposed architecture presents a good compromise between acquisition and ownership cost, flexibility, manageability and security. The system is composed by an autonomous and smart console per room which controls the devices in that room. In spite of consoles being completely autonomous they can be controlled...
Sharing network resources with user groups, divisions, or even other companies in software defined networking promises better network utilization. Resource sharing is effectively realized by empowering these tenants at the control plane with permissions for administrating network components. However, since the network resources at the data plane are shared and different tenants can have competing...
Gathering network flow statistics is nowadays considered to be an essential part of network monitoring activities. OpenFlow based networks although built around the concept of network flows do not natively support exporting flow statistics. This paper investigates the potential for efficient traffic flow monitoring in the OpenFlow networks and relevant monitoring information export over the well-known...
A Software Defined Network (SDN) is a new network architecture that provides central control over the network. Although central control is the major advantage of SDN, it is also a single point of failure if it is made unreachable by a Distributed Denial of Service (DDoS) Attack. To mitigate this threat, this paper proposes to use the central control of SDN for attack detection and introduces a solution...
Software Defined Networking promises to simplify network management tasks by separating the control plane (a central controller) from the data plane (switches). OpenFlow has emerged as the de facto standard for communication between the controller and switches. Apart from providing flow control and communication interfaces, OpenFlow provides a flow level statistics collection mechanism from the data...
Distributed Denial of Service attacks are a growing threat to organizations and, as defense mechanisms are becoming more advanced, hackers are aiming at the application layer. For example, application layer Low and Slow Distributed Denial of Service attacks are becoming a serious issue because, due to low resource consumption, they are hard to detect. In this position paper, we propose a reference...
Actual electric network infrastructure is poorly adapted to the new requirements of the society for reliability, efficiency and sustainability. Thus, it must undergo an intense modernization in the next years, becoming smart, also known as Smart Grids. In this Smart Grid context, computer systems will be a key hole in the analysis and monitoring of several devices that are connected to the grid. This...
Due to the working hazardous or other conditions, such as tele-medical, tele-embodiment, operations should be executed with a fully remote control and monitoring. So, tele-control and reality simulation are crucial in these environments. However, there exists a lack of an effective system architecture that integrates remote condition monitoring and control of automated equipment; that give much consideration...
Basile et al. synthesizes a Petri net monitor with the least implementation cost through integer programming formulations. Despite its technical correctness, their method may lead to undesirable results when the net structure contains some shared or unshared resource places as often seen in manufacturing oriented Petri net models. This paper analyzes and resolves such an issue by proposing an improved...
This paper presents a command and control system implemented in Motru Hydro Power Plant. The system is an open system that allows further development of hardware and software, both the process and operating stations and in the communication system. System management is provided with the opportunity to connect to a higher level of supervision of the plant and monitoring SCADA systems in the central...
As an explicit congestion control protocol, API-RCP (Adaptive PI rate control protocol) was originally proposed for best-effort traffic control in the IP networks with high bandwidth-delay product. The original API-RCP adopts a truncated network model for IP router in order to simplify the control system design while still achieving various designed performance measures at steady-state. A further...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.