SDN-based double hopping communication against sniffer attack (Q1793716): Difference between revisions
From MaRDI portal
Created claim: Wikidata QID (P12): Q59140984, #quickstatements; #temporary_batch_1705817641484 |
Added link to MaRDI item. |
||
links / mardi / name | links / mardi / name | ||
Revision as of 08:35, 1 February 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | SDN-based double hopping communication against sniffer attack |
scientific article |
Statements
SDN-based double hopping communication against sniffer attack (English)
0 references
12 October 2018
0 references
Summary: Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC) approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.
0 references