Công bố khoa học

Phương Pháp Phát Sinh Dữ Liệu Tấn Công Đánh Lừa IDS Học Máy Dựa Trên Mạng Sinh Đối Kháng

5 năm trước

Trình phát hiện xâm nhập mạng (Network IDS) được xây dựng để phát hiện và cảnh báo khi hệ thống bị tấn công, từ đó có thể đưa ra các phản ứng phù hợp. Với sự bùng nổ của dữ liệu, các phương pháp học máy đã bắt đầu được…

Đọc tiếp >>>

Deceive Intrusion Detection System with GAN and Function-Preserving on Adversarial Samples in SDN-enabled networks

5 năm trước

Deceive Intrusion Detection System with GAN and Function-Preserving on Adversarial Samples in SDN-enabled networks (*selected as an Excellent Young Research Award at VANJ 2020 conference) (abstract only)

Đọc tiếp >>>

CVSS Based Attack Analysis using a Graphical Security Model: Review and Smart Grid Case Study

5 năm trước

Smart Grid is one of the critical technologies that provide essential services to sustain social and economic developments. There are various cyber attacks on the Smart Grid system in recent years, which resulted in various negative repercussions. Therefore, understanding the characteristics and evaluating the consequences of an attack on the…

Đọc tiếp >>>

A Comparison of Congestion Control Algorithms in Emulated Wi-Fi Networks

5 năm trước

Wi-Fi technology has become popular in our lives with various Wi-Fi capable products such as laptops, mobile phones, etc. Moreover, in Wi-Fi networks, a device communicates typically with a server using Transmission Control Protocol (TCP) for most applications. In such a context, the behavior of the TCP congestion control primarily…

Đọc tiếp >>>

Forensic analysis of TikTok application to seek digital artifacts on Android smartphone

5 năm trước

Emerging with highlight features as a global phenomenon, TikTok – the international version of Douyin application in China market, is a social media video app for creating and sharing short lip-syncing. This social video platform has seen astounding growth by reaching 1.5 billion users in 2019 by capturing the cultural…

Đọc tiếp >>>

SDNLog-Foren: Ensuring the Integrity and Tamper Resistance of Log Files for SDN Forensics Using Blockchain

6 năm trước

Despite bringing many benefits of global network configuration and control, Software Defined Networking (SDN) also presents potential challenges for both digital forensics and cybersecurity. In fact, there are various attacks targeting a range of vulnerabilities on vital elements of this paradigm such as controller, Northbound and Southbound interfaces. In addition…

Đọc tiếp >>>

A Software Defined Networking Approach for Guaranteeing Delay in Wi-Fi Networks

6 năm trước

Recently, low latency has become one of the most critical requirements in Wi-Fi networks (e.g., for Internet access). Many factors and events such as bufferbloat, which unexpectedly happen, can affect the delay of Wi-Fi networks. Hence, the delay requirement leads to the essential of a management mechanism, which can 1)…

Đọc tiếp >>>

A Security-Enhanced Monitoring System for Northbound Interface in SDN using Blockchain

6 năm trước

In Software-Defined Networking (SDN), Northbound Interface provides APIs, which allow network applications to communicate with SDN controllers. However, a malicious application can access to SDN controller and perform illegal activities via these APIs. Although some studies proposed AAA (Authentication, Authorization, Accounting) systems to protect SDN controllers from malicious applications, their…

Đọc tiếp >>>

Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN

6 năm trước

Controller is a key component in the three layers of Software – Defined Networking (SDN), which is to process a huge number of flow requests from network devices. As a result, it puts a flow rule into flow table in switch according to every incoming packet. However, the capacity of…

Đọc tiếp >>>