<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="19903" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/19903?output=omeka-xml" accessDate="2026-04-29T12:16:13+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="174244">
              <text>Lightweight Anti DDoS Security Tool: Edge Level Filtering in SDN using P4</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="174245">
              <text>Edge level filtering; ICMP authentication; P4 programming language; Software Defined Network (SDN) security</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="174246">
              <text>Software Defined Network (SDN) which has a promising future in satellite communication was first introduced as the solution to solve problems existing in the traditional network architecture. So far in SDN, mitigation strategies employed hardware installation or software solution which is heavily dependent on SDN controllers. The disadvantage of these approaches is the a) cost for implementation, b) intensive resource usage, and 3) costly optimization strategy necessary to enhance SDN performance. This research aims to fill the gap of the previously seen defense mechanism by enabling edge-level filtering without involving the control plane. By implementing filtering functions in edge switches, it can provide an efficient and effective defense layer in SDN network systems so that SDN switch can become the first line of defense against packet injection attacks. The proposed solution, Lightweight Anti-DDoS Software (LADS) focuses on lightweight workloads and provisioning of effective filtering mechanism to allow SDN switches to drop and block malicious packets sent by attackers. It utilizes Programming Protocol-independent Packet Processors (P4) programming language to create custom functionalities in SDN switches. P4 allows SDN switches to conduct host authentication and malicious packet filtering as well as blacklisting to isolate attackers. Simulation result proves that LADS efficiently manages malicious activities and maintains network performance during attacks at the data plane independent of SDN controller.   2023 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="174247">
              <text>Arafune M.; Goswami B.; Kulkarni M.; Venkatachalam N.; Asadollahi S.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="174248">
              <text>2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="174249">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="174250">
              <text>2023-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="174251">
              <text>&lt;a href="https://doi.org/10.1109/ICECCT56650.2023.10179747" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/ICECCT56650.2023.10179747&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85166629405&amp;amp;doi=10.1109%2FICECCT56650.2023.10179747&amp;amp;partnerID=40&amp;amp;md5=fa33f16e4bfebf21c085dcab73f792ea" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85166629405&amp;amp;doi=10.1109%2fICECCT56650.2023.10179747&amp;amp;partnerID=40&amp;amp;md5=fa33f16e4bfebf21c085dcab73f792ea&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="174252">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="174253">
              <text>ISBN: 978-166549360-4</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="174254">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="174255">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="174256">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="174257">
              <text>Arafune M., Queensland University of Technology, Brisbane, Australia; Goswami B., Queensland University of Technology, Brisbane, Australia; Kulkarni M., CHRIST (Deemed to Be University), Bangalore, India; Venkatachalam N., Queensland University of Technology, Brisbane, Australia; Asadollahi S., Fujitsu, Brisbane, Australia</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
