Libros bestsellers hasta 50% dcto  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Methodology to Improve Control Plane Security in Sdn Environments (in English)
Type
Physical Book
Language
English
Pages
100
Format
Paperback
ISBN13
9788770041959

Methodology to Improve Control Plane Security in Sdn Environments (in English)

Wendwossen Desalegn (Author) · Javed Shaikh (Author) · Bayisa Taye (Author) · River Publishers · Paperback

Methodology to Improve Control Plane Security in Sdn Environments (in English) - Desalegn, Wendwossen ; Shaikh, Javed ; Taye, Bayisa

New Book

$ 97.24

$ 162.07

You save: $ 64.83

40% discount
  • Condition: New
Origin: United Kingdom (Import costs included in the price)
It will be shipped from our warehouse between Tuesday, June 11 and Friday, June 21.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Methodology to Improve Control Plane Security in Sdn Environments (in English)"

This book unveils a blueprint for safeguarding the very backbone of modern communication networks. It offers a roadmap towards fortifying SDN infrastructures against the relentless onslaught of cyber threats, ensuring resilience and reliability in an ever-evolving digital landscape.This is an exhaustive study of crafting a robust security solution tailored for the SDN environment, specifically targeting the detection and mitigation of distributed denial of service (DDoS) attacks on the control plane. The methodology hinges on an early detection strategy, meticulously aligned with industry standards, serving as a beacon for professionals navigating the intricate realm of implementing security solutions. This reference elucidates an innovative approach devised to identify and mitigate the inherent risks associated with the OpenFlow protocol and its POX controller. Validated through rigorous simulations conducted within controlled environments utilizing the Mininet tool and SDN controller, the methodology unfolds, showcasing the intricate dance between theory and practice.Through meticulous observation of detection algorithm results in simulated environments, followed by real-world implementation within network testbeds, the proposed solution emerges triumphant. Leveraging network entropy calculation, coupled with swift port blocking mechanisms, the methodology stands as a formidable barrier against a DDoS attack such as TCP, UDP, and ICMP floods.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews