Cui et al., 2017 - Google Patents
Authentication mechanism for network applications in SDN environmentsCui et al., 2017
- Document ID
- 160435543792960158
- Author
- Cui H
- Chen Z
- Yu L
- Xie K
- Xia Z
- Publication year
- Publication venue
- 2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)
External Links
Snippet
Software-defined Networking, a new networking paradigm, provides network programming for third parties by separating control plane from data forwarding plane and opening network capabilities. SDN brings great flexibility and openness to the network, but the original design …
- 238000000034 method 0 description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/141—Denial of service attacks against endpoints in a network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
Cui et al. | Authentication mechanism for network applications in SDN environments | |
Shaghaghi et al. | Software-defined network (SDN) data plane security: issues, solutions, and future directions | |
Kumari et al. | A taxonomy of blockchain-enabled softwarization for secure UAV network | |
Yoon et al. | Flow wars: Systemizing the attack surface and defenses in software-defined networks | |
Scott-Hayward et al. | A survey of security in software defined networks | |
Shu et al. | Security in software-defined networking: Threats and countermeasures | |
Chen et al. | Software-defined mobile networks security | |
Akhunzada et al. | Securing software defined networks: taxonomy, requirements, and open issues | |
Scott-Hayward | Design and deployment of secure, robust, and resilient SDN controllers | |
Ujcich et al. | Cross-app poisoning in software-defined networking | |
Almutairy et al. | A taxonomy of virtualization security issues in cloud computing environments | |
Aliyu et al. | A trust management framework for network applications within an SDN environment | |
Yang et al. | Security challenges in the container cloud | |
Rauf et al. | Application threats to exploit northbound interface vulnerabilities in software defined networks | |
Varadharajan et al. | Techniques for Enhancing Security in Industrial Control Systems | |
Chung et al. | Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations | |
Zhan et al. | CIADL: cloud insider attack detector and locator on multi-tenant network isolation: an OpenStack case study | |
Paladi et al. | Towards secure multi-tenant virtualized networks | |
Tseng et al. | A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking | |
Jo et al. | Nosarmor: Building a secure network operating system | |
Yao et al. | Security in software-defined-networking: A survey | |
Vassilakis et al. | Security challenges of small cell as a service in virtualized mobile edge computing environments | |
Mahboob et al. | Authentication mechanism to secure communication between wireless sdn planes | |
Shamsan et al. | Security Issues and Challenges in SDN |