RETRACTED: Bayesian trust analysis of flooding attacks in distributed software defined networking nodes (Retracted Article)

被引:3
|
作者
Moorthy, Vaishnavi [1 ]
Venkataraman, Revathi [1 ]
Gururajan, Raj [2 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Kattankuluthur Campus, Chennai, Tamil Nadu, India
[2] Univ Southern Queensland, Sch Management & Enterprise, Springfield Campus, Springfield Cent, Australia
关键词
Wireless sensor networks; Communication; Software defined networks; Flooding attacks; Trust analysis;
D O I
10.1007/s12652-020-02428-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the networking infrastructure is becoming complex, there is a parallel increase in the networking scenario to become more vulnerable to various types of sophisticated malicious attacks. This leads to the data and information loss. The most feasible way to reduce the vulnerable and malicious attacks is by evaluating trust of the interacting agents in a network. The primary objective of this paper is to analyze the flooding attacks caused due to the communication protocols like TCP and UDP in software defined spine leaf topology. The trust analysis is done using Bayesian networks for a reliable communication network. The probability and the causal effect of the denial of service in the proposed distributed networking scenario are reasoned out. The trust analysis will help to increase the confidence over a dedicated communication at the time of malicious attack over the distributed network. This analysis will enable the software defined control plane to make a crucial and needed decision over its communication with other nodes during compromised security attack through communication protocols.
引用
收藏
页码:7489 / 7498
页数:10
相关论文
共 50 条
  • [1] RETRACTED ARTICLE: Bayesian trust analysis of flooding attacks in distributed software defined networking nodes
    Vaishnavi Moorthy
    Revathi Venkataraman
    Raj Gururajan
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 7489 - 7498
  • [2] Retraction Note to: Bayesian trust analysis of flooding attacks in distributed software defined networking nodes
    Vaishnavi Moorthy
    Revathi Venkataraman
    Raj Gururajan
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 23 - 23
  • [3] RETRACTED: A Game Model for Incentive Mechanism of Distributed Nodes in Supply Chains (Retracted Article)
    Jiang, Jingjing
    Lyu, Aobo
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2021, 2021
  • [4] RETRACTED: Electrical machine analysis using free software (Retracted Article)
    Meeker, David
    Bianchi, Nicola
    Gyselinck, Johan
    Sabariego, Ruth V.
    Alberti, Luigi
    Pellegrino, Gianmario
    Cupertino, Francesco
    Geuzaine, Christophe
    Remacle, Jean-Francois
    Dular, Patrick
    2017 IEEE ENERGY CONVERSION CONGRESS AND EXPOSITION (ECCE), 2017,
  • [5] RETRACTED: Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis (Retracted Article)
    Wu, Zehui
    Zhang, Wenbin
    Wang, Yunchao
    Yan, Chenyu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] RETRACTED: Psychological Analysis for Depression Detection from Social Networking Sites (Retracted Article)
    Gupta, Sonam
    Goel, Lipika
    Singh, Arjun
    Prasad, Ajay
    Ullah, Mohammad Aman
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [7] RETRACTED: A dynamic distributed diagnosis algorithm for an arbitrary network topology with unreliable nodes and links (Retracted Article)
    Khilar, Pabitra Mohan
    Mahapatra, S.
    ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, : 125 - +
  • [8] RETRACTED: Hybrid machine learning approach for trust evaluation to secure MANET from routing attacks (Retracted Article)
    Meenakshi, K.
    Revathi, M.
    Harsha, Sanda Sri
    Tamilarasi, K.
    Shanthi, T. S.
    Sugumar, D.
    Suriyakrishnaan, K.
    Maheswari, B. Uma
    Rajaram, A.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (02) : 3429 - 3445
  • [9] Causal Analysis for Software-Defined Networking Attacks
    Ujcich, Benjamin E.
    Jero, Samuel
    Skowyra, Richard
    Bates, Adam
    Sanders, William H.
    Okhravi, Hamed
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3183 - 3200
  • [10] RETRACTED: The Construction, Mechanism and Application Analysis of Trust Model of Industrial Clusters (Retracted Article)
    Chen, Jianfeng
    Xie, Liang
    2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009, 2009, : 14 - +