Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
Software Defined Networking (SDN) is an emergent network architecture with a unique feature of decoupling an infrastructure plane from the control plane. SDN enables network-wide visibility to the applications running on top of the controller by executing a topology discovery module. However, the ad...
| Main Author: | Suleman , Khan |
|---|---|
| Format: | Thesis |
| Published: |
2017
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/11729/ http://studentsrepo.um.edu.my/11729/2/Suleman.pdf http://studentsrepo.um.edu.my/11729/1/Suleman_Khan.pdf |
Similar Items
Future technology: Software-defined network (SDN) forensic
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Software-Defined Networking (SDN): A review
by: Waseem, Quadri, et al.
Published: (2022)
by: Waseem, Quadri, et al.
Published: (2022)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei
by: Hamid , Tahaei
Published: (2018)
by: Hamid , Tahaei
Published: (2018)
Software-defined routing protocol for mobile cognitive radio networks : a cross-layer perspective
by: Qusay Medhat, Salih
Published: (2022)
by: Qusay Medhat, Salih
Published: (2022)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Service based load balance mechanism using software-defined networks / Ahmed Abdelaziz Abdelltif Osman
by: Ahmed Abdelaziz, Abdelltif Osman
Published: (2017)
by: Ahmed Abdelaziz, Abdelltif Osman
Published: (2017)
Applying software-defined networking to support telemedicine health consultation during and post Covid-19 era
by: Anthony, Bokolo Jnr., et al.
Published: (2021)
by: Anthony, Bokolo Jnr., et al.
Published: (2021)
A Bring-Your-Own-Device Framework over Software Defined Networking
by: Khoo, Wai Lung
Published: (2015)
by: Khoo, Wai Lung
Published: (2015)
QSroute: A QoS aware routing scheme for Software Defined Networking
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Speech features analysis of the joint speech separation and automatic speech recognition model / Tawseef Khan
by: Tawseef , Khan
Published: (2021)
by: Tawseef , Khan
Published: (2021)
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario
by: Tahaei, Hamid, et al.
Published: (2018)
by: Tahaei, Hamid, et al.
Published: (2018)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Leveraging proactive flow to improve scalability in software defined networking / Oseghale Osemudiamen Victor
by: Oseghale , Osemudiamen Victor
Published: (2019)
by: Oseghale , Osemudiamen Victor
Published: (2019)
Integrating Edge Computing and Software Defined Networking in Internet of Things: A Systematic Review
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
User defined methods
by: Hakro, Dil Nawaz, et al.
Published: (2011)
by: Hakro, Dil Nawaz, et al.
Published: (2011)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
QSroute: Enhancing software defined networking routing scheme through advanced QoS metrics integration
by: Imran Edzereiq, Kamarudin, et al.
Published: (2025)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2025)
Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns
by: Chan, Gaik Yee, et al.
Published: (2016)
by: Chan, Gaik Yee, et al.
Published: (2016)
A Defensive Evidence Model: An Approach of Security Model for Storing Digital Evidence in Network Forensics
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
by: Mohd Izham, Ibrahim, et al.
Published: (2012)
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Software defined internet of things in smart city: A review
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
Applying software-defined networking to support telemedicine health consultation during and post Covid-19 era
by: Anthony, Bokolo Jnr., et al.
Published: (2020)
by: Anthony, Bokolo Jnr., et al.
Published: (2020)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
An evidence-based forensic taxonomy of windows phone dating apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Similar Items
-
Future technology: Software-defined network (SDN) forensic
by: Waseem, Quadri, et al.
Published: (2021) -
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016) -
Software-Defined Networking (SDN): A review
by: Waseem, Quadri, et al.
Published: (2022) -
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019) -
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)