[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Cui et al., 2017 - Google Patents

Authentication mechanism for network applications in SDN environments

Cui et al., 2017

Document ID
160435543792960158
Author
Cui H
Chen Z
Yu L
Xie K
Xia Z
Publication year
Publication venue
2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)

External Links

Snippet

Software-defined Networking, a new networking paradigm, provides network programming for third parties by separating control plane from data forwarding plane and opening network capabilities. SDN brings great flexibility and openness to the network, but the original design …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/141Denial of service attacks against endpoints in a network

Similar Documents

Publication Publication Date Title
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
Cui et al. Authentication mechanism for network applications in SDN environments
Shaghaghi et al. Software-defined network (SDN) data plane security: issues, solutions, and future directions
Kumari et al. A taxonomy of blockchain-enabled softwarization for secure UAV network
Yoon et al. Flow wars: Systemizing the attack surface and defenses in software-defined networks
Scott-Hayward et al. A survey of security in software defined networks
Shu et al. Security in software-defined networking: Threats and countermeasures
Chen et al. Software-defined mobile networks security
Akhunzada et al. Securing software defined networks: taxonomy, requirements, and open issues
Scott-Hayward Design and deployment of secure, robust, and resilient SDN controllers
Ujcich et al. Cross-app poisoning in software-defined networking
Almutairy et al. A taxonomy of virtualization security issues in cloud computing environments
Aliyu et al. A trust management framework for network applications within an SDN environment
Yang et al. Security challenges in the container cloud
Rauf et al. Application threats to exploit northbound interface vulnerabilities in software defined networks
Varadharajan et al. Techniques for Enhancing Security in Industrial Control Systems
Chung et al. Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations
Zhan et al. CIADL: cloud insider attack detector and locator on multi-tenant network isolation: an OpenStack case study
Paladi et al. Towards secure multi-tenant virtualized networks
Tseng et al. A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking
Jo et al. Nosarmor: Building a secure network operating system
Yao et al. Security in software-defined-networking: A survey
Vassilakis et al. Security challenges of small cell as a service in virtualized mobile edge computing environments
Mahboob et al. Authentication mechanism to secure communication between wireless sdn planes
Shamsan et al. Security Issues and Challenges in SDN