Chen et al., 2023 - Google Patents
A Blockchain-Based Performance Monitoring Scheme for Network Function Virtualization in Space-Aerial-Terrestrial Integrated NetworksChen et al., 2023
- Document ID
- 15042699524433671238
- Author
- Chen Y
- Chen X
- Zhang Z
- Li L
- Sun H
- Cui Y
- Publication year
- Publication venue
- 2023 IEEE Globecom Workshops (GC Wkshps)
External Links
Snippet
Space-Aerial-Terrestrial Integrated Networks have been applied worldwide in weather forecasting, disaster pre-paredness, and education in recent years. Since the SATIN is too complicated to manage, Network Functions Virtualization (NFV) has been proposed to …
- 238000012544 monitoring process 0 title abstract description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
- H04L41/0654—Network fault recovery
- H04L41/0659—Network fault recovery by isolating the faulty entity
- H04L41/0663—Network fault recovery by isolating the faulty entity involving offline failover planning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/40—Bus networks
- H04L12/40052—High-speed IEEE 1394 serial bus
- H04L12/40104—Security; Encryption; Content protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
- H04L67/025—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP] for remote control or remote monitoring of the application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0803—Configuration setting of network or network elements
- H04L41/0813—Changing of configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/40—Techniques for recovering from a failure of a protocol instance or entity, e.g. failover routines, service redundancy protocols, protocol state redundancy or protocol service redirection in case of a failure or disaster recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/22—Arrangements for maintenance or administration or management of packet switching networks using GUI [Graphical User Interface]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrag et al. | Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning | |
Xing et al. | Survey on botnet detection techniques: Classification, methods, and evaluation | |
JP6378395B2 (en) | Use of DNS requests and host agents for path exploration and anomaly / change detection and network status recognition for anomaly subgraph detection | |
Yan et al. | Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges | |
Sowah et al. | Detection and prevention of man‐in‐the‐middle spoofing attacks in MANETs using predictive techniques in artificial neural networks (ANN) | |
US10623424B2 (en) | Supplementing network flow analysis with endpoint information | |
US12058148B2 (en) | Distributed threat sensor analysis and correlation | |
US10581880B2 (en) | System and method for generating rules for attack detection feedback system | |
Farina et al. | Understanding ddos attacks from mobile devices | |
US12041094B2 (en) | Threat sensor deployment and management | |
US20220092087A1 (en) | Classification including correlation | |
CN103891206A (en) | Method and device for synchronizing network data flow detection status | |
Chaudhary et al. | DDoS attacks in Industrial IoT: A survey | |
Swami et al. | DDoS attacks and defense mechanisms using machine learning techniques for SDN | |
Sadineni et al. | Ready-iot: A novel forensic readiness model for internet of things | |
Lyu et al. | A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection | |
Qing et al. | MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective. | |
Aloul et al. | A monitoring and control gateway for iot edge devices in smart home | |
Hammoudeh et al. | Network traffic analysis for threat detection in the internet of things | |
Tariq et al. | The industrial internet of things (iiot): An anomaly identification and countermeasure method | |
Chen et al. | A Blockchain-Based Performance Monitoring Scheme for Network Function Virtualization in Space-Aerial-Terrestrial Integrated Networks | |
Alturfi et al. | Internet of Things security techniques: A survey | |
CN112003853B (en) | Network security emergency response system supporting ipv6 | |
Omotosho et al. | IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated Learning | |
Hu et al. | A Random Label and Lightweight Hash‐Based Security Authentication Mechanism for a UAV Swarm |