[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shu et al., 2016 - Google Patents

Security in software-defined networking: Threats and countermeasures

Shu et al., 2016

View PDF
Document ID
334958638976907763
Author
Shu Z
Wan J
Li D
Lin J
Vasilakos A
Imran M
Publication year
Publication venue
Mobile Networks and Applications

External Links

Snippet

Abstract In recent years, Software-Defined Networking (SDN) has been a focus of research. As a promising network architecture, SDN will possibly replace traditional networking, as it brings promising opportunities for network management in terms of simplicity …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Shu et al. Security in software-defined networking: Threats and countermeasures
Shaghaghi et al. Software-defined network (SDN) data plane security: issues, solutions, and future directions
Maleh et al. A comprehensive survey on SDN security: threats, mitigations, and future directions
Kumari et al. A taxonomy of blockchain-enabled softwarization for secure UAV network
Scott-Hayward et al. A survey of security in software defined networks
Akhunzada et al. Secure and dependable software defined networks
Li et al. A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
Sun et al. Security-as-a-service for microservices-based cloud applications
Chen et al. Software-defined mobile networks security
Reynaud et al. Attacks against network functions virtualization and software-defined networking: State-of-the-art
Dhawan et al. Sphinx: detecting security attacks in software-defined networks.
Akhunzada et al. Securing software defined networks: taxonomy, requirements, and open issues
Arbettu et al. Security analysis of OpenDaylight, ONOS, Rosemary and Ryu SDN controllers
Jero et al. Beads: Automated attack discovery in openflow-based sdn systems
Abdelrahman et al. Software‐defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions
Röpke et al. Sdn rootkits: Subverting network operating systems of software-defined networks
Betgé-Brezetz et al. Trust support for SDN controllers and virtualized network applications
Zeng et al. Full-stack vulnerability analysis of the cloud-native platform
Cao et al. When match fields do not need to match: Buffered packets hijacking in SDN
Varadharajan et al. Counteracting attacks from malicious end hosts in software defined networks
Noh et al. Vulnerabilities of network OS and mitigation with state‐based permission system
Abd Elazim et al. Software defined networking: attacks and countermeasures
Ahmed et al. Modelling cyber security for software-defined networks those grow strong when exposed to threats: Analysis and propositions
Pattaranantakul et al. Service Function Chaining security survey: Addressing security challenges and threats
Köksal et al. Distributed denial‐of‐service attack mitigation in network functions virtualization‐based 5G networks using management and orchestration