{"title":"使用软件定义网络(SDN)增强物联网设备的安全性","authors":"S. Anand, An Ganeshwari","doi":"10.1109/DISCOVER55800.2022.9974896","DOIUrl":null,"url":null,"abstract":"Software Defined Networking (SDN) help for networking design which aims to deal with association and control flexibility. SDN is associated with the open stream and ODIN V2, which is used for long-distance correspondence in general. Its strategy is central, deft, and well-organized. With the advent of reasonably speed internet and common calculating processors, people now have the ability to access an original atmosphere of opportunities and challenges at their fingers. This most recent start of innovation has impacted areas such as education, organization, business, clinical, and corporate settings. This introduction of IoT, the number of connected devices will be greater than at any point in recent memory. These threats are designed to tamper with the information’s dependability, infiltrate various initiatives in order to spread farther, and to profit financially Ransomware has recently become the most well-known virus that has made headlines. This type of malware infection encrypts client explicit documents and demands a payment in exchange for their retrieval. Programming characterized organizing, or SDN, is the smoothing out and centralization of large commercial network organization. The most typical benefits of SDN can be described with traffic programmability, readiness, and the ability to support strategy-driven for checking the network and send network robotization. Programming projects can use an organization engineering method to supervise and organize the organization in a thoughtful and halfway manner. This allows administrators to deal with the entire company uniformly and exhaustively, regardless of the hidden organization innovation. Current ransom ware behavior shows the infection spreading from the host victim to other PCs and shared drives inside the company. This document offers a point-by-point analysis of ransomware and the malware’s flow patterns. The time taken for Crypto Wall ransomware encryption using AES is measured for various data volumes, and an SDN strategy for ransomware risk mitigation is discussed.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing Security for IoT Devices using Software Defined Networking (SDN)\",\"authors\":\"S. Anand, An Ganeshwari\",\"doi\":\"10.1109/DISCOVER55800.2022.9974896\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software Defined Networking (SDN) help for networking design which aims to deal with association and control flexibility. SDN is associated with the open stream and ODIN V2, which is used for long-distance correspondence in general. Its strategy is central, deft, and well-organized. With the advent of reasonably speed internet and common calculating processors, people now have the ability to access an original atmosphere of opportunities and challenges at their fingers. This most recent start of innovation has impacted areas such as education, organization, business, clinical, and corporate settings. This introduction of IoT, the number of connected devices will be greater than at any point in recent memory. These threats are designed to tamper with the information’s dependability, infiltrate various initiatives in order to spread farther, and to profit financially Ransomware has recently become the most well-known virus that has made headlines. This type of malware infection encrypts client explicit documents and demands a payment in exchange for their retrieval. Programming characterized organizing, or SDN, is the smoothing out and centralization of large commercial network organization. The most typical benefits of SDN can be described with traffic programmability, readiness, and the ability to support strategy-driven for checking the network and send network robotization. Programming projects can use an organization engineering method to supervise and organize the organization in a thoughtful and halfway manner. This allows administrators to deal with the entire company uniformly and exhaustively, regardless of the hidden organization innovation. Current ransom ware behavior shows the infection spreading from the host victim to other PCs and shared drives inside the company. This document offers a point-by-point analysis of ransomware and the malware’s flow patterns. The time taken for Crypto Wall ransomware encryption using AES is measured for various data volumes, and an SDN strategy for ransomware risk mitigation is discussed.\",\"PeriodicalId\":264177,\"journal\":{\"name\":\"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DISCOVER55800.2022.9974896\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DISCOVER55800.2022.9974896","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhancing Security for IoT Devices using Software Defined Networking (SDN)
Software Defined Networking (SDN) help for networking design which aims to deal with association and control flexibility. SDN is associated with the open stream and ODIN V2, which is used for long-distance correspondence in general. Its strategy is central, deft, and well-organized. With the advent of reasonably speed internet and common calculating processors, people now have the ability to access an original atmosphere of opportunities and challenges at their fingers. This most recent start of innovation has impacted areas such as education, organization, business, clinical, and corporate settings. This introduction of IoT, the number of connected devices will be greater than at any point in recent memory. These threats are designed to tamper with the information’s dependability, infiltrate various initiatives in order to spread farther, and to profit financially Ransomware has recently become the most well-known virus that has made headlines. This type of malware infection encrypts client explicit documents and demands a payment in exchange for their retrieval. Programming characterized organizing, or SDN, is the smoothing out and centralization of large commercial network organization. The most typical benefits of SDN can be described with traffic programmability, readiness, and the ability to support strategy-driven for checking the network and send network robotization. Programming projects can use an organization engineering method to supervise and organize the organization in a thoughtful and halfway manner. This allows administrators to deal with the entire company uniformly and exhaustively, regardless of the hidden organization innovation. Current ransom ware behavior shows the infection spreading from the host victim to other PCs and shared drives inside the company. This document offers a point-by-point analysis of ransomware and the malware’s flow patterns. The time taken for Crypto Wall ransomware encryption using AES is measured for various data volumes, and an SDN strategy for ransomware risk mitigation is discussed.