39
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Status of address spoofing attack prevention techniques in software-defined networking (SDN)

, , , &

References

  • M. Z. Masoud, Y. Jaradat, and I. Jannoud, “On preventing ARP poisoning attack utilizing Software Defined Network (SDN) paradigm,” in 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), 2015, pp. 1–5.
  • O. Strugaru, A. D. Potorac, and A. Graur, “The impact of using Source Address Validation filtering on processing resources,” in 2014 10th International Conference on Communications (COMM), 2014, pp. 1–4.
  • G. Chen, G. Hu, Y. Jiang, and C. Zhang, “SAVSH: IP source address validation for SDN hybrid networks,” in 2016 IEEE Symposium on Computers and Communication (ISCC), 2016, pp. 409–414.
  • B. Liu, J. Bi, and Y. Zhou, “Source address validation in software defined networks,” SIGCOMM 2016 - Proc. 2016 ACM Conf. Spec. Interes. Gr. Data Commun., no. Dc, pp. 595–596, 2016.
  • C. Zhang, et al., “Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack,” IEEE Access, vol. 6, pp. 22764–22777, 2017. doi: https://doi.org/10.1109/ACCESS.2017.2785236
  • Pankaj Dadheech, Ankit Kumar, Chothmal Choudhary, Mahender Kumar Beniwal, Sanwta Ram Dogiwal & Basant Agarwal (2019), “An Enhanced 4-Way Technique Using Cookies for Robust Authentication Process in Wireless Network”, Journal of Statistics and Management Systems, 22:4, 773-782, DOI: https://doi.org/10.1080/09720510.2019.1609557.
  • Ankit Kumar, Pankaj Dadheech, Vijander Singh, Linesh Raja & Ramesh C. Poonia (2019), “An Enhanced Quantum Key Distribution Protocol for Security Authentication”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 499-507, DOI: https://doi.org/10.1080/09720529.2019.1637154.
  • Ankit Kumar, Pankaj Dadheech, Vijander Singh, Ramesh C. Poonia & Linesh Raja (2019), “An Improved Quantum Key Distribution Protocol for Verification”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 491-498, DOI: https://doi.org/10.1080/09720529.2019.1637153.
  • Ankit Kumar and Madhavi Sinha (2019), “Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET)”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 453-463, DOI: https://doi.org/10.1080/09720529.2019.1637151.
  • Ankit Kumar & Madhavi Sinha (2019) Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET, Journal of Statistics and Management Systems, 22:4, 753-761, DOI: https://doi.org/10.1080/09720510.2019.1609555
  • Ankit Kumar, Pankaj Dadheech, Rajani Kumari & Vijander Singh (2019) Anenhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm, Journal of Statistics and Management Systems, 22:7, 1349-1364, DOI: https://doi.org/10.1080/09720510.2019.1618519
  • Ramesh Chand Meena, Meenakshi Nawal, Mahesh Bundele (2020). SIPAV-SDN: Source Internet Protocol Address Validation for Software Defined Network, International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8:12, PP: 3386-3393, 2019. DOI: https://doi.org/10.35940/ijitee.L2632.1081219

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.