Article
Computer Science, Information Systems
Jinwoo Kim, Yeonkeun Kim, Vinod Yegneswaran, Phillip Porras, Seungwon Shin, Taejune Park
Summary: Software-Defined Networking (SDN)-based Network Function Virtualization (NFV) technologies improve network dependability and resilience, but often suffer from poor performance and complex configurations. To address these issues, a new SDN-based data plane architecture called DPX is proposed, which supports in-network security services and provides simplified configuration and efficient enforcement of security policies.
COMPUTERS & SECURITY
(2023)
Article
Computer Science, Theory & Methods
Qi Li, Xinhao Deng, Zhuotao Liu, Yuan Yang, Xiaoyue Zou, Qian Wang, Mingwei Xu, Jianping Wu
Summary: NFV is a new networking paradigm focusing on dynamic network function deployment, but existing studies lack effective solutions for security function enforcement. FuncE proposes a method for efficient real-time security function enforcement through unified dynamic flow and function scheduling, achieving near-optimal solutions and significantly reducing latency compared to existing solvers.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Review
Computer Science, Information Systems
Roya Taheri, Habib Ahmed, Engin Arslan
Summary: With the rapid growth in scale and complexity of networks, managing, maintaining, and optimizing them has become increasingly challenging. Software-Defined Networking (SDN) is widely adopted for managing large-scale networks due to its centralized control, global network view, and software-based traffic analysis. However, SDN is vulnerable to cyber attacks, especially certain types such as denial of service. Various attack mitigation strategies, including statistical, threshold-based, and Machine Learning (ML) methods, have been proposed. Among them, Deep Learning (DL)-based models have shown the best results by extracting complex relationships between input and output. This paper presents a comprehensive survey of the literature on the use of different DL algorithms for SDN security.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Amir Javadpour, Forough Ja'fari, Pedro Pinto, Weizhe Zhang
Summary: This paper studies resource allocation in SDN and proposes an effective initial mapping method called EIMSDN. By initializing mapping, the need to rewrite rules on switches is eliminated, improving the efficiency of infrastructure resource management. The paper also considers optimizing resource allocation through dynamic infrastructure resources management in network virtualization.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Madhukrishna Priyadarsini, Padmalochan Bera
Summary: Software-defined networking (SDN) separates logical control and data forwarding, allowing for flexible network configuration and routing policies to enhance traffic management and security.
Article
Telecommunications
Sikandar Khan, Adeel Akram, Haitham Alsaif, Muhammad Usman
Summary: SDN enables a new networking paradigm that improves system efficiency and simplifies management of complex networks. Mininet, a cost-effective Linux-based network emulator, allows practical implementation of SDN and Wi-Fi support in ns-3.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Jiadai Wang, Jiajia Liu
Summary: Internet of Vehicles (IoV) is an emerging technology in the automotive field that allows vehicles to communicate with each other and roadside infrastructures to improve information acquisition and enhance security and comfort. Software-defined networking (SDN) architecture, with its centralized management and flexible control, offers a promising solution for the increasingly complex vehicular network. However, the security of SDN in application scenarios is often overlooked. This study focuses on the location hijacking attack against SDN in vehicular networks and proposes an attack recovery scheme based on deep Q-learning (DQL) to increase the network's resilience.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Cheng Ren, Hao Li, Yaxin Li, Yu Wang, Haiyun Xiang, Xuxiang Chen
Summary: This paper emphasizes the importance of using network function virtualization (NFV) and software-defined networking (SDN) for service function chain (SFC) provisioning. By jointly optimizing SDN deployment and VNF placement, a tradeoff can be made between capital expenditures (CAPEX) and operating expenses (OPEX), and an appropriate SDN deployment rate can be determined for network operators.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2022)
Article
Chemistry, Analytical
Marek Amanowicz, Damian Jankowski
Summary: This paper proposes a system that uses SDN features and data mining techniques to protect SDNs against malicious flows, with experiments confirming the system's effectiveness.
Article
Computer Science, Information Systems
Ling Shen, Muqing Wu, Min Zhao
Summary: This study explores the relationship between resource value and node security level in SDN networks, presents evaluation indicators considering differences in resource value, and proposes two novel SVNE algorithms based on node ranking methods. Simulation results demonstrate the superiority of the proposed algorithms over other typical algorithms in improving resource utilization and network security in SDN environments.
Article
Computer Science, Hardware & Architecture
Nisha Ahuja, Gaurav Singal, Debajyoti Mukhopadhyay, Neeraj Kumar
Summary: Software-Defined Networking (SDN) allows network engineers to monitor and control the network efficiently, while also identifying malicious traffic and link failure in an effective manner. To counter DDoS attacks, the paper proposes using machine learning techniques to classify benign traffic from attack traffic. Results show that the hybrid model of Support Vector classifier with Random Forest (SVC-RF) achieved a testing accuracy of 98.8% with a low false alarm rate.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Majd Latah, Kubra Kalkan
Summary: The integration of Software-Defined Networking (SDN) and Blockchain (BC) technology enhances the security of network systems, but also faces performance degradation issues when applied to SDN's data plane.
Article
Computer Science, Information Systems
Sujie Shao, Weichao Gong, Huifeng Yang, Shaoyong Guo, Liandong Chen, Ao Xiong
Summary: The 6G wireless network aims to connect trillions of devices in the future by establishing a new spectrum, high technical standards, and 100% geographic coverage. However, ensuring privacy and security becomes challenging as connectivity and novel applications increase. Blockchain is seen as a promising technology to improve efficiency, reduce costs, and establish a trusted data-sharing environment. This article presents a trusted framework based on blockchain technology for building a trusted software-defined content delivery network, enhancing security and trust relationships between entities in different domains.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Hardware & Architecture
Ozgur Yurekten, Mehmet Demirci
Summary: This paper introduces a new network security system Citadel, utilizing cyber threat intelligence and virtualization technologies for automated, flexible, and effective network defense. By analyzing CTI data, extracting attacker models, and designing corresponding security services, Citadel provides a proactive defense against network threats.
Article
Computer Science, Theory & Methods
Jingyu Hua, Zidong Zhou, Sheng Zhong
Summary: In this article, we propose the first True Worm-Hole Attack in Software-Defined Networking, which introduces a relay host to establish an in-band covert channel between cheating switches, achieving packet transmission over the forged link without using any out-of-band channels. Attackers only need remote read and write privileges of flow tables, without altering software or hardware. Extensive experiments demonstrate the high feasibility and manageable impact of this attack.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Computer Science, Information Systems
Amal Durou, Ibrahim Aref, Somaya Al-Maadeed, Ahmed Bouridane, Elhadj Benkhelifa
INFORMATION PROCESSING & MANAGEMENT
(2019)
Article
Computer Science, Software Engineering
Elhadj Benkhelifa, Thomas Welsh, Lo'ai Tawalbeh, Yaser Jararweh
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2020)
Article
Computer Science, Theory & Methods
Majid Al-Ruithe, Elhadj Benkhelifa
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2020)
Review
Computer Science, Information Systems
Majid Al-Ruithe, Elhadj Benkhelifa, Khawar Hameed
PERSONAL AND UBIQUITOUS COMPUTING
(2019)
Editorial Material
Computer Science, Information Systems
Yaser Jararweh, Mahmoud Al-Ayyoub, Elhadj Benkhelifa
INFORMATION PROCESSING & MANAGEMENT
(2019)
Article
Computer Science, Interdisciplinary Applications
Zakia Berber, Samir Kameche, Elhadj Benkhelifa
SIMULATION MODELLING PRACTICE AND THEORY
(2019)
Review
Computer Science, Artificial Intelligence
Oluwasegun Adedugbe, Elhadj Benkhelifa, Russell Campion, Feras Al-Obeidat, Anoud Hani, Uchitha Jayawickrama
Article
Automation & Control Systems
Thomas Welsh, Elhadj Benkhelifa
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2019)
Correction
Computer Science, Artificial Intelligence
Oluwasegun Adedugbe, Elhadj Benkhelifa, Russell Campion, Feras Al-Obeidat, Anoud Bani Hani, Uchitha Jayawickrama
Article
Computer Science, Software Engineering
Abdelkerim Souahlia, Ammar Belatreche, Abdelkader Benyettou, Zoubir Ahmed-Foitih, Elhadj Benkhelifa, Kevin Curran
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2020)
Article
Telecommunications
Leila Benarous, Benamar Kadri, Ahmed Bouridane, Elhadj Benkhelifa
Summary: The existing vehicle registration systems are centralized and prone to allowing the registration of illegally smuggled or stolen vehicles. A proposed transparent system using blockchain technology aims to improve security and transparency by saving transaction records on a public blockchain. Evaluation shows the superiority of this solution compared to current registration systems in terms of security and resilience against forged transactions.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2022)
Article
Computer Science, Information Systems
Feras Al-Obeidat, Anoud Bani-Hani, Oluwasegun Adedugbe, Munir Majdalawieh, Elhadj Benkhelifa
Summary: Social data analysis is a vital tool for businesses and organizations to mine data from social media for purposes such as customer opinion mining, pattern recognition, and predictive analytics. This paper proposes a persistence mechanism and methodology leveraging cloud computing, microservices, and orchestration for online social data analysis, maximizing cloud capabilities and optimizing cloud computing resources to deliver real-time, persistent social data analytics as a cloud service.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan
Article
Computer Science, Information Systems
Majid Al-Ruithe, Elhadj Benkhelifa, Yaser Jararweh, Chirine Ghedira
JOURNAL OF INTERNET TECHNOLOGY
(2018)
Article
Computer Science, Hardware & Architecture
Elhadj Benkhelifa, Benjamin E. Thomas, Lo'ai Tawalbeh, Yaser Jararweh
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS
(2018)
Article
Computer Science, Interdisciplinary Applications
Shivani Sharma, Sateesh Kumar Awasthi
Summary: Vehicular Ad-hoc Network (VANET) is crucial in Intelligent Transportation Systems, and this study proposes a hybrid system utilizing V2V and V2I communications for secure data dissemination in urban scenarios.
SIMULATION MODELLING PRACTICE AND THEORY
(2024)
Article
Computer Science, Interdisciplinary Applications
Hind Mikram, Said El Kafhali, Youssef Saadi
Summary: Efficient task scheduling in cloud data centers is crucial for optimizing resource utilization and load balance. This paper introduces a hybrid algorithm, HEPGA, that combines particle swarm optimization (PSO) and genetic algorithm (GA) to allocate tasks efficiently and minimize makespan in cloud computing environments. By integrating PSO, GA, and HEFT-based initialization, the algorithm capitalizes on parallel processing capabilities and adapts to varying priorities to enhance resource utilization. Meticulous analysis of the algorithm's performance, considering both makespan and resource utilization, demonstrates its ability to consistently allocate resources and adapt to different optimization goals.
SIMULATION MODELLING PRACTICE AND THEORY
(2024)
Article
Computer Science, Interdisciplinary Applications
Ping-Chen Chang, Cheng-Fu Huang, Ding-Hsiang Huang
Summary: This paper introduces a novel simulation approach based on minimal cuts to estimate the system reliability of a multistate flow network (MSFN). The approach improves computational efficiency by reducing the number of minimal cuts and preserving saturated minimal cuts. It effectively deals with non-integer demands and demonstrates effectiveness and efficiency in illustrative examples.
SIMULATION MODELLING PRACTICE AND THEORY
(2024)
Article
Computer Science, Interdisciplinary Applications
Jang Won Bae, Chun-Hee Lee, Jeong-Woo Lee, Seon Han Choi
Summary: In this study, a data-driven agent-based model is proposed for simulating the public bicycle-sharing systems (PBSSs) in Sejong City, South Korea. The model captures users' behavioral characteristics and analyzes their convenience through a bottom-up approach. By extracting parameters from actual operational data and demographic information, the model's accuracy is improved. Model simulations evaluate the utilization and user convenience of Eoulling, providing a viable solution for addressing multiple concerns.
SIMULATION MODELLING PRACTICE AND THEORY
(2024)
Article
Computer Science, Interdisciplinary Applications
Chong Shi, Junbao Pian, Cong Zhang, Xiao Chen, Yonggang Zhang
Summary: This study presents a novel numerical simulation method for analyzing the mechanisms of pulsed pressure-induced rock fractures. The results show that rock fracturing under impulsive loading is a combined effect of stress waves and high-pressure fluids, with the fluid penetration and splitting action playing important roles in the process.
SIMULATION MODELLING PRACTICE AND THEORY
(2024)
Article
Computer Science, Interdisciplinary Applications
Junwei Zhang, Zhongwei Chen, Kang Shao
Summary: This study investigated the performance of three constitutive models for rock material in simulation of blast-induced rock cracks, and proposed an optimal blasting parameters design.
SIMULATION MODELLING PRACTICE AND THEORY
(2024)
Article
Computer Science, Interdisciplinary Applications
Joshua Shakya, Chaima Ghribi, Leila Merghem-Boulahia
Summary: Modeling and simulation of telecommunication networks, especially 5G+ networks, have become increasingly important and challenging. Traditional simulation techniques may not be sufficient to capture the dynamic changes in 5G+ networks, leading researchers to adopt an Agent-based modeling and simulation approach from the perspective of Complex System Science. This study provides insights into the advantages, potential, and challenges of Agent-based simulation in the context of 5G+ networks, and proposes a prospective architecture for a simulator and its evolution into a Digital Twin.
SIMULATION MODELLING PRACTICE AND THEORY
(2024)
Article
Computer Science, Interdisciplinary Applications
Sensen Xing, Cheng Wang, Wei Wang, Rui Feng Cao, Anthony Chun Yin Yuen, Eric Wai Ming Lee, Guan Heng Yeoh, Qing Nian Chan
Summary: This paper proposes an extended FFCA model that integrates the natural step length into pedestrian movement, allowing pedestrians to occupy multiple grids and expanding the interaction area. Through simulation of evacuation scenarios, the model accurately reproduces density-velocity relations and matches experimental results. Compared to traditional models, this model generates more reasonable velocity variations and evacuation paths.
SIMULATION MODELLING PRACTICE AND THEORY
(2024)