Shu et al., 2016 - Google Patents
Security in software-defined networking: Threats and countermeasuresShu et al., 2016
View PDF- Document ID
- 334958638976907763
- Author
- Shu Z
- Wan J
- Li D
- Lin J
- Vasilakos A
- Imran M
- Publication year
- Publication venue
- Mobile Networks and Applications
External Links
Snippet
Abstract In recent years, Software-Defined Networking (SDN) has been a focus of research. As a promising network architecture, SDN will possibly replace traditional networking, as it brings promising opportunities for network management in terms of simplicity …
- 238000000034 method 0 abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shu et al. | Security in software-defined networking: Threats and countermeasures | |
Shaghaghi et al. | Software-defined network (SDN) data plane security: issues, solutions, and future directions | |
Maleh et al. | A comprehensive survey on SDN security: threats, mitigations, and future directions | |
Kumari et al. | A taxonomy of blockchain-enabled softwarization for secure UAV network | |
Scott-Hayward et al. | A survey of security in software defined networks | |
Akhunzada et al. | Secure and dependable software defined networks | |
Li et al. | A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures | |
Sun et al. | Security-as-a-service for microservices-based cloud applications | |
Chen et al. | Software-defined mobile networks security | |
Reynaud et al. | Attacks against network functions virtualization and software-defined networking: State-of-the-art | |
Dhawan et al. | Sphinx: detecting security attacks in software-defined networks. | |
Akhunzada et al. | Securing software defined networks: taxonomy, requirements, and open issues | |
Arbettu et al. | Security analysis of OpenDaylight, ONOS, Rosemary and Ryu SDN controllers | |
Jero et al. | Beads: Automated attack discovery in openflow-based sdn systems | |
Abdelrahman et al. | Software‐defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions | |
Röpke et al. | Sdn rootkits: Subverting network operating systems of software-defined networks | |
Betgé-Brezetz et al. | Trust support for SDN controllers and virtualized network applications | |
Zeng et al. | Full-stack vulnerability analysis of the cloud-native platform | |
Cao et al. | When match fields do not need to match: Buffered packets hijacking in SDN | |
Varadharajan et al. | Counteracting attacks from malicious end hosts in software defined networks | |
Noh et al. | Vulnerabilities of network OS and mitigation with state‐based permission system | |
Abd Elazim et al. | Software defined networking: attacks and countermeasures | |
Ahmed et al. | Modelling cyber security for software-defined networks those grow strong when exposed to threats: Analysis and propositions | |
Pattaranantakul et al. | Service Function Chaining security survey: Addressing security challenges and threats | |
Köksal et al. | Distributed denial‐of‐service attack mitigation in network functions virtualization‐based 5G networks using management and orchestration |