Search Results - "Aladaileh, Mohammad Adnan"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking by Bahashwan, Abdullah Ahmed, Anbar, Mohammed, Manickam, Selvakumar, Al-Amiedy, Taief Alaa, Aladaileh, Mohammad Adnan, Hasbullah, Iznan H

    Published in Sensors (Basel, Switzerland) (01-05-2023)
    “…Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability…”
    Get full text
    Journal Article
  2. 2

    HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN by Bahashwan, Abdullah Ahmed, Anbar, Mohammed, Manickam, Selvakumar, Issa, Ghassan, Aladaileh, Mohammad Adnan, Alabsi, Basim Ahmad, Rihan, Shaza Dawood Ahmed

    Published in PloS one (08-02-2024)
    “…Software Defined Network (SDN) has alleviated traditional network limitations but faces a significant challenge due to the risk of Distributed Denial of…”
    Get full text
    Journal Article
  3. 3

    Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates by Aladaileh, Mohammad Adnan, Anbar, Mohammed, Hintaw, Ahmed J., Hasbullah, Iznan H., Bahashwan, Abdullah Ahmed, Al-Sarawi, Shadi

    Published in Applied sciences (01-06-2022)
    “…The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of…”
    Get full text
    Journal Article
  4. 4

    A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things by Hintaw, Ahmed J., Manickam, Selvakumar, Karuppayah, Shankar, Aladaileh, Mohammad Adnan, Aboalmaaly, Mohammed Faiz, Laghari, Shams Ul Arfeen

    Published in IEEE access (01-01-2023)
    “…Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security…”
    Get full text
    Journal Article
  5. 5

    Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks by Al-Sarawi, Shadi, Anbar, Mohammed, Alabsi, Basim Ahmad, Aladaileh, Mohammad Adnan, Rihan, Shaza Dawood Ahmed

    Published in IEEE access (01-01-2023)
    “…An Internet of Things (IoT) refers to a network of smart devices that enable data collection and exchange. RPL is a protocol specifically designed for IPv6…”
    Get full text
    Journal Article
  6. 6

    Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis by Aladaileh, Mohammad Adnan, Anbar, Mohammed, Hintaw, Ahmed J., Hasbullah, Iznan H., Bahashwan, Abdullah Ahmed, Al-Amiedy, Taief Alaa, Ibrahim, Dyala R.

    Published in Applied sciences (01-01-2023)
    “…Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic…”
    Get full text
    Journal Article
  7. 7

    A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things by Al-Amiedy, Taief Alaa, Anbar, Mohammed, Belaton, Bahari, Bahashwan, Abdullah Ahmed, Hasbullah, Iznan Husainy, Aladaileh, Mohammad Adnan, Mukhaini, Ghada AL

    Published in Internet of things (Amsterdam. Online) (01-07-2023)
    “…The Internet of Things (IoT) is one of the most rapidly evolving networking concepts, offering various applications for human benefit. Advances in embedded…”
    Get full text
    Journal Article
  8. 8