期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Varna-based optimization:a novel method for capacitated controller placement problem in SDN 被引量:1
1
作者 Ashutosh Kumar SINGH Saurabh MAURYA shashank srivastava 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第3期87-111,共25页
Recently,software defined networking(SDN)is a promising paradigm shift that decouples the control plane from the data plane.It can centrally monitor and control the network through softwarization,i.e.,controller.Multi... Recently,software defined networking(SDN)is a promising paradigm shift that decouples the control plane from the data plane.It can centrally monitor and control the network through softwarization,i.e.,controller.Multiple controllers are a necessity of current SDN based WAN.Placing multiple controllers in an optimum way is known as controller placement problem(CPP).Earlier,solutions of CPP only concentrated on propagation latency but overlooked the capacity of controllers and the dynamic load on switches,which is a significant factor in real networks.In this paper,we develop a novel optimization algorithm named varna-based optimization(VBO)and use it to solve CPP.To the best of our knowledge,this is the first attempt to minimize the total average latency of SDN along with the implementation of TLBO and Jaya algorithms to solve CPP for all twelve possible scenarios.Our experimental results show that TLBO outperforms PSO,and VBO outperforms TLBO and Jaya algorithms in all scenarios for all topologies. 展开更多
关键词 SDN controller placement CPP LATENCY VBO
原文传递
Security Attacks in Named Data Networking: A Review and Research Directions
2
作者 Naveen Kumar Ashutosh Kumar Singh +1 位作者 Abdul Aleem shashank srivastava 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第6期1319-1350,共32页
Contents such as audios,videos,and images,contribute most of the Internet traffic in the current paradigm.Secure content sharing is a tedious issue.The existing security solutions do not secure data but secure the com... Contents such as audios,videos,and images,contribute most of the Internet traffic in the current paradigm.Secure content sharing is a tedious issue.The existing security solutions do not secure data but secure the communicating endpoints.Named data networking(NDN)secures the data by enforcing the data publisher to sign the data.Any user can verify the data by using the public key of the publisher.NDN is resilient to most of the probable security attacks in the TCP/IP model due to its new architecture.However,new types of attacks are possible in NDN.This article surveys the most significant security attacks in NDN such as interest flooding attacks,cache privacy attacks,cache pollution attacks,and content poisoning attacks.Each attack is classified according to their behavior and discussed for their detection techniques,countermeasures,and the affected parameters.The article is an attempt to help new researchers in this area to gather the domain knowledge of NDN.The article also provides open research issues that could be addressed by researchers. 展开更多
关键词 named data networking(NDN) interest flooding attack cache privacy attack cache pollution attack content poisoning attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部