SDN-based double hopping communication against sniffer attack (Q1793716): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Set OpenAlex properties.
 
(5 intermediate revisions by 5 users not shown)
Property / Wikidata QID
 
Property / Wikidata QID: Q59140984 / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1155/2016/8927169 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2274365030 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 17:43, 21 March 2024

scientific article
Language Label Description Also known as
English
SDN-based double hopping communication against sniffer attack
scientific article

    Statements

    SDN-based double hopping communication against sniffer attack (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    12 October 2018
    0 references
    Summary: Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC) approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.
    0 references

    Identifiers