External Device to Protect the Software-Defined Network Performance in Case of a Malicious Attack.
Abdullah Soliman Alshra'aJochen SeitzPublished in: ICFNDS (2019)
Keyphrases
- normal traffic
- malicious users
- data flow
- network traffic
- desktop computers
- software systems
- abstraction layer
- network services
- computer networks
- malicious traffic
- network structure
- malicious attacks
- network topologies
- cyber attacks
- security risks
- network attacks
- ddos attacks
- user interface
- data acquisition
- computer systems
- peer to peer
- software development
- source code