A Neutrosophic Model for Ranking Technical Sol utions for Three Types of ARP Attacks in SDN Architecture

Faculty Computer Science Year: 2023
Type of Publication: ZU Hosted Pages:
Authors:
Journal: International Journal of Neutrosophic Science ASPG Volume:
Keywords : , Neutrosophic Model , Ranking Technical , utions , Three Types    
Abstract:
Software-defined networks (SDN) have developed an understanding of the technological world in recent decades, which has led scholars to become interested in its problems. One of the primary issues facing SDN networks is security. We discovered that ARP assaults constitute a significant threat to SDN, so we provided in this survey the most recent solutions put forth to counteract these attacks, and rank the technical solutions based on the neutrosophic set. The neutrosophic set is used to deal with uncertain data in the evaluation process. The neutrosophic set is integrated with the TOPSIS method to obtain the rank of the proposed solutions. The TOPSIS method is used to give a rank of alternatives with specified criteria. This will make it easier for future researchers to identify and combat the three different forms of ARP attacks—ARP flooding assault, ARP spoofing attack, and ARP broadcasting attack. Prior to that, we went into more detail on SDN networks, including their design and, in particular, the shortcomings of the ARP protocol. Since SDN focuses on separating the controller plane from the data plane and centralizing the controller, it differs significantly from traditional networks and has stirred considerable controversy in the networking industry. Due to the fact that SDN is software-based, it offers greater flexibility, scalability, programmatic management, and control. The decoupling of the control and forwarding planes also enables SDN to connect to applications via application programming interfaces (APIs), supporting application security and performance and resulting in a scalable and dynamic network architecture. Contrarily, because traditional networks are hardware-based, they must use fixed functions and specialized hardware and devices to control the network. As a result, scaling traditional networks requires purchasing new hardware, which is a common issue. The SDN network architecture and its properties, as well as the most significant issues— particularly the three different types of ARP attacks that affect SDN—are covered in some sections of this research. These sections also discuss the best current remedies for these issues and outline the
   
     
 
       

Author Related Publications

  • Ehab Roshdy Mohamed, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Ehab Roshdy Mohamed, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Ehab Roshdy Mohamed, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Ehab Roshdy Mohamed, "Solving systems of nonlinear equations via conjugate direction flower pollination algorithm", inderscience, 2017 More
  • Ehab Roshdy Mohamed, "Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage", IEEE, 2019 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet