[go: up one dir, main page]

Shu et al., 2016 - Google Patents

Security in software-defined networking: Threats and countermeasures

Shu et al., 2016

View PDF
Document ID
334958638976907763
Author
Shu Z
Wan J
Li D
Lin J
Vasilakos A
Imran M
Publication year
Publication venue
Mobile Networks and Applications

External Links

Snippet

Abstract In recent years, Software-Defined Networking (SDN) has been a focus of research. As a promising network architecture, SDN will possibly replace traditional networking, as it brings promising opportunities for network management in terms of simplicity …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Shu et al. Security in software-defined networking: Threats and countermeasures
Maleh et al. A comprehensive survey on SDN security: threats, mitigations, and future directions
Shaghaghi et al. Software-defined network (SDN) data plane security: issues, solutions, and future directions
Scott-Hayward et al. A survey of security in software defined networks
Li et al. A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
Abdelrahman et al. Software‐defined networking security for private data center networks and clouds: vulnerabilities, attacks, countermeasures, and solutions
Sun et al. Security-as-a-service for microservices-based cloud applications
Chen et al. Software-defined mobile networks security
Akhunzada et al. Securing software defined networks: taxonomy, requirements, and open issues
Reynaud et al. Attacks against network functions virtualization and software-defined networking: State-of-the-art
Karmakar et al. Mitigating attacks in software defined networks
Dhawan et al. Sphinx: detecting security attacks in software-defined networks.
Jero et al. Beads: Automated attack discovery in openflow-based sdn systems
Arbettu et al. Security analysis of OpenDaylight, ONOS, Rosemary and Ryu SDN controllers
Röpke et al. Sdn rootkits: Subverting network operating systems of software-defined networks
Zeng et al. Full-stack vulnerability analysis of the cloud-native platform
Betgé-Brezetz et al. Trust support for SDN controllers and virtualized network applications
Nam et al. Secure inter-container communications using XDP/eBPF
Varadharajan et al. Counteracting attacks from malicious end hosts in software defined networks
Ahmed et al. Modelling cyber security for software-defined networks those grow strong when exposed to threats: Analysis and propositions
Noh et al. Vulnerabilities of network OS and mitigation with state‐based permission system
Laniepce et al. Engineering intrusion prevention services for iaas clouds: The way of the hypervisor
Abd Elazim et al. Software defined networking: attacks and countermeasures
Köksal et al. Distributed denial‐of‐service attack mitigation in network functions virtualization‐based 5G networks using management and orchestration
Gomez et al. Controller-oblivious dynamic access control in software-defined networks