Mostrar el registro sencillo del ítem

dc.creatorCorrea Chica J.C.
dc.creatorImbachi J.C.
dc.creatorBotero Vega J.F.
dc.date2020
dc.date.accessioned2020-04-29T14:53:51Z
dc.date.available2020-04-29T14:53:51Z
dc.identifier.issn10848045
dc.identifier.urihttp://hdl.handle.net/11407/5743
dc.descriptionSoftware Defined Networking (SDN) is a revolutionary paradigm that is maturing along with other network technologies in the next-gen trend. The separation of control and data planes in SDN enables the emergence of novel network features like centralized flow management and network programmability that encourage the introduction of new and enhanced network functions in order to improve prominent network deployment aspects such as flexibility, scalability, network-wide visibility and cost-effectiveness. Although SDN exhibits a rapid evolution that is shaping this technology as a key enabler for future implementations in heterogeneous network scenarios, namely, datacenters, ISPs, corporate, academic and home; the technology is far from being considered secure and dependable to this day which inhibits its agile adoption. In recent years, the scientific community has been attracted to explore the field of SDN security to close the gap to SDN adoption. A twofold research context has been identified: on the one hand, leveraging SDN features to enhance security; while on the other hand one can find the pursue of a secure SDN system architecture. This article includes a description of security threats that menace SDN and a list of attacks that take advantage of vulnerabilities and misconfigurations in SDN constitutive elements. Accordingly, a discussion emphasizing the duality SDN-for-security and SDN-security is also presented. A comprehensive review of state-of-the art is accompanied by a categorization of the current research literature in a taxonomy that highlights the main characteristics and contributions of each proposal. Finally, the identified urgent needs and less explored topics are used to outline the opportunities and future challenges in the field of SDN security. © 2020 Elsevier Ltd
dc.language.isoeng
dc.publisherAcademic Press
dc.relation.isversionofhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85082809201&doi=10.1016%2fj.jnca.2020.102595&partnerID=40&md5=c656cfb5552b37d3391464f8233a240c
dc.sourceJournal of Network and Computer Applications
dc.subjectAttack detection
dc.subjectForensics
dc.subjectNetwork applications
dc.subjectNetwork monitoring
dc.subjectNetwork security
dc.subjectOpenflow
dc.subjectProgrammable networks
dc.subjectSecurity threats
dc.subjectSoftware defined networking
dc.subjectThreats mitigation
dc.subjectTraffic inspection
dc.subjectVirtualized network functions
dc.subjectVulnerabilities
dc.subjectApplication programs
dc.subjectCost effectiveness
dc.subjectHeterogeneous networks
dc.subjectInformation management
dc.subjectNetwork function virtualization
dc.subjectSecurity systems
dc.subjectSoftware defined networking
dc.subjectTransfer functions
dc.subjectAttack detection
dc.subjectForensics
dc.subjectNetwork applications
dc.subjectNetwork functions
dc.subjectNetwork Monitoring
dc.subjectOpenflow
dc.subjectProgrammable network
dc.subjectSecurity threats
dc.subjectThreats mitigations
dc.subjectVulnerabilities
dc.subjectNetwork security
dc.titleSecurity in SDN: A comprehensive survey
dc.typeRevieweng
dc.rights.accessrightsinfo:eu-repo/semantics/restrictedAccess
dc.publisher.programIngeniería de Sistemas
dc.identifier.doi10.1016/j.jnca.2020.102595
dc.relation.citationvolume159
dc.publisher.facultyFacultad de Ingenierías
dc.affiliationCorrea Chica, J.C., Universidad de Antioquia and Instituto Tecnológico Metropolitano de Medellín, Universidad de Medellín, Universidad de Antioquia Calle, 67 # 53 108, Medellín, Colombia; Imbachi, J.C., Universidad de Antioquia and Instituto Tecnológico Metropolitano de Medellín, Universidad de Medellín, Universidad de Antioquia Calle, 67 # 53 108, Medellín, Colombia; Botero Vega, J.F., Universidad de Antioquia and Instituto Tecnológico Metropolitano de Medellín, Universidad de Medellín, Universidad de Antioquia Calle, 67 # 53 108, Medellín, Colombia
dc.relation.referencesAbubakar, A., Pranggono, B., Machine learning based intrusion detection system for software defined networks (2017) 2017 Seventh International Conference on Emerging Security Technologies, pp. 138-143. , EST
dc.relation.referencesAhmad, I., Namal, S., Ylianttila, M., Gurtov, A., Security in software defined networks: a survey (2015) IEEE Commun. Surv. Tutor., 17 (4), pp. 2317-2346
dc.relation.referencesAjaeiya, G.A., Adalian, N., Elhajj, I.H., Kayssi, A., Chehab, A., Flow-based intrusion detection system for sdn (2017) 2017 IEEE Symposium on Computers and Communications, pp. 787-793. , ISCC
dc.relation.referencesAkhunzada, A., Ahmed, E., Gani, A., Khan, M.K., Imran, M., Guizani, S., Securing software defined networks: taxonomy, requirements, and open issues (2015) IEEE Commun. Mag., 53 (4), pp. 36-44
dc.relation.referencesAkhunzada, A., Gani, A., Anuar, N.B., Abdelaziz, A., Khan, M.K., Hayat, A., Khan, S.U., Secure and dependable software defined networks (2016) J. Netw. Comput. Appl., 61, pp. 199-221
dc.relation.referencesAl-Shaer, E., Al-Haj, S., Flowchecker: configuration analysis and verification of federated openflow infrastructures (2010) Proceedings of the 3rd ACM Workshop on Assurable and Useable Security Configuration, pp. 37-44. , ACM
dc.relation.referencesAlEroud, A., Alsmadi, I., Identifying cyber-attacks on software defined networks: an inference-based intrusion detection approach (2017) J. Netw. Comput. Appl., 80, pp. 152-164
dc.relation.referencesAli, S.T., Sivaraman, V., Radford, A., Jha, S., A survey of securing networks using software defined networking (2015) IEEE Trans. Reliab., 64 (3), pp. 1086-1097
dc.relation.referencesAlsmadi, I., Xu, D., Security of software defined networks: a survey (2015) Comput. Secur., 53, pp. 79-108
dc.relation.referencesBanikazemi, M., Olshefski, D., Shaikh, A., Tracey, J., Wang, G., Meridian: an sdn platform for cloud network services (2013) IEEE Commun. Mag., 51 (2), pp. 120-127
dc.relation.referencesBattula, L.R., Network security function virtualization(nsfv) towards cloud computing with nfv over openflow infrastructure: challenges and novel approaches (2014) 2014 International Conference on Advances in Computing, Communications and Informatics, pp. 1622-1628. , ICACCI
dc.relation.referencesBenton, K., Camp, L.J., Small, C., Openflow vulnerability assessment (2013) Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 151-152. , ACM
dc.relation.referencesBernardo, D.V., Chua, B.B., Introduction and analysis of sdn and nfv security architecture (sn-seca) (2015) 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 796-801
dc.relation.referencesBianco, A., Birke, R., Giraudo, L., Palacin, M., Openflow switching: data plane performance (2010) 2010 IEEE International Conference on Communications, pp. 1-5
dc.relation.referencesBifulco, R., Rtvri, G., A survey on the programmable data plane: abstractions architectures and open problems (2018) Proc. IEEE HPSR, , IEEE
dc.relation.referencesBraun, W., Menth, M., Software-defined networking using openflow: protocols, applications and architectural design choices (2014) Future Internet, 6 (2), pp. 302-336
dc.relation.referencesCanini, M., Venzano, D., Peresini, P., Kostic, D., Rexford, J., A nice way to test openflow applications (2012) Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, , NSDI)
dc.relation.referencesCaprolu, M., Raponi, S., Di Pietro, R., Fortress: an efficient and distributed firewall for stateful data plane sdn, security and communication networks (2019)
dc.relation.referencesChandrasekaran, B., Benson, T., Tolerating sdn application failures with legosdn (2014) Proceedings of the 13th ACM Workshop on Hot Topics in Networks, pp. 1-7. , ACM
dc.relation.referencesCheminod, M., Durante, L., Seno, L., Valenza, F., Valenzano, A., Zunino, C., Leveraging sdn to improve security in industrial networks (2017) 2017 IEEE 13th International Workshop on Factory Communication Systems, pp. 1-7. , WFCS
dc.relation.referencesChowdhary, A., Huang, D., Alshamrani, A., Sabur, A., Kang, M.H., Kim, A., Velazquez, A., (1811), Sdfw: Sdn-based stateful distributed firewall, CoRR abs/1811.00634. arXiv00634. URL
dc.relation.referencesChung, C.-J., Khatkar, P., Xing, T., Lee, J., Huang, D., Nice: network intrusion detection and countermeasure selection in virtual network systems (2013) IEEE Trans. Dependable Secure Comput., 10 (4), pp. 198-211
dc.relation.referencesConti, M., De Gaspari, F., Mancini, L.V., Know your enemy: stealth configuration-information gathering in sdn (2017) International Conference on Green, Pervasive, and Cloud Computing, pp. 386-401. , Springer
dc.relation.referencesConti, M., Gaspari, F.D., Mancini, L.V., A novel stealthy attack to gather sdn configuration-information (2018) IEEE Trans. Emerg. Top. Comput., pp. 1-12
dc.relation.referencesCoughlin, M., A Survey of Sdn Security Research (2014), University of Colorado Boulder
dc.relation.referencesCox, J.H., Clark, R., Owen, H., Leveraging sdn and webrtc for rogue access point security (2017) IEEE Trans. Netw. Serv. Manag., 14 (3), pp. 756-770
dc.relation.referencesda Silva, A.S., Smith, P., Mauthe, A., Schaeffer-Filho, A., Resilience support in software-defined networking: a survey (2015) Comput. Network., 92, pp. 189-207
dc.relation.referencesDacier, M., Dietrich, S., Kargl, F., Knig, H., Network attack detection and defense: security challenges and opportunities of software-defined networking (2016) Dagstuhl Rep., 6 (9), pp. 1-28
dc.relation.referencesDacier, M.C., Knig, H., Cwalinski, R., Kargl, F., Dietrich, S., Security challenges and opportunities of software-defined networking (2017) IEEE Secur. Priv., 15 (2), pp. 96-100
dc.relation.referencesDeng, J., Hu, H., Li, H., Pan, Z., Wang, K.C., Ahn, G.J., Bi, J., Park, Y., Vnguard: an nfv/sdn combination framework for provisioning and managing virtual firewalls (2015) 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), pp. 107-114
dc.relation.referencesDeng, S., Gao, X., Lu, Z., Gao, X., Packet injection attack and its defense in software-defined networks (2018) IEEE Trans. Inf. Forensics Secur., 13 (3), pp. 695-705
dc.relation.referencesDhawan, M., Poddar, R., Mahajan, K., Mann, V., Sphinx: detecting security attacks in software-defined networks (2015) Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium
dc.relation.referencesDong, P., Du, X., Zhang, H., Xu, T., A detection method for a novel ddos attack against sdn controllers by vast new low-traffic flows (2016) 2016 IEEE International Conference on Communications, pp. 1-6. , ICC
dc.relation.referencesDover, J.M., A Denial of Service Attack against the Open Floodlight Sdn Controller (2013)
dc.relation.referencesDover, J.M., A Switch Table Vulnerability in the Open Floodlight Sdn Controller (2014)
dc.relation.referencesFarhady, H., Lee, H., Nakao, A., Software-defined networking: a survey (2015) Comput. Network., 81, pp. 79-95
dc.relation.referencesFeamster, N., Rexford, J., Zegura, E., The road to sdn (2013) Queue, 11 (12), p. 20
dc.relation.referencesFernandez, M.P., Comparing openflow controller paradigms scalability: reactive and proactive (2013) 2013 IEEE 27th International Conference on Advanced Information Networking and Applications, pp. 1009-1016. , AINA)
dc.relation.referencesFonseca, P., Bennesby, R., Mota, E., Passito, A., A replication component for resilient openflow-based networking (2012) 2012 IEEE Network Operations and Management Symposium, pp. 933-939
dc.relation.referencesFoster, N., Harrison, R., Freedman, M.J., Monsanto, C., Rexford, J., Story, A., Walker, D., Frenetic: a network programming language (2011) ACM Sigplan Not., 46 (9), pp. 279-291
dc.relation.referencesFundation, O.N., Software-defined networking: the new norm for networks (2012) ONF White Paper, 2, pp. 2-6
dc.relation.referencesGray, N., Zinner, T., Tran-Gia, P., Enhancing sdn security by device fingerprinting (2017) 2017 IFIP/IEEE Symposium on Integrated Network and Service Management, pp. 879-880. , IM
dc.relation.referencesHaleplidis, E., Salim, J.H., Halpern, J.M., Hares, S., Pentikousis, K., Ogawa, K., Wang, W., Koufopavlou, O., Network programmability with forces (2015) IEEE Commun. Surv. Tutor., 17 (3), pp. 1423-1440
dc.relation.referencesHinrichs, T., Mitchell, J., Gude, N., Shenker, S., Casado, M., Expressing and Enforcing Flow-Based Network Security Policies (2008), Tech. rep University of Chicago
dc.relation.referencesHizver, J., Taxonomic modeling of security threats in software defined networking (2015) Proceedings of BlackHat Conference 2015, pp. 1-16
dc.relation.referencesHogg, S., Sdn Security Attack Vectors and Sdn Hardening: Securing Sdn Deployments Right from the Start (2014)
dc.relation.referencesHong, S., Xu, L., Wang, H., Gu, G., Poisoning network visibility in software-defined networks: new attacks and countermeasures (2015) Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS), 15, pp. 8-11
dc.relation.referencesHu, H., Han, W., Ahn, G.-J., Zhao, Z., Flowguard: building robust firewalls for software-defined networks (2014) Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, pp. 97-102. , ACM
dc.relation.referencesHu, F., Hao, Q., Bao, K., A survey on software-defined network and openflow: from concept to implementation (2014) IEEE Commun. Surv. Tutor., 16 (4), pp. 2181-2206
dc.relation.referencesHu, Z., Wang, M., Yan, X., Yin, Y., Luo, Z., A comprehensive security architecture for sdn (2015) 2015 18th International Conference on Intelligence in Next Generation Networks, pp. 30-37
dc.relation.referencesHussein, A., Elhajj, I.H., Chehab, A., Kayssi, A., Sdn security plane: an architecture for resilient security services (2016) 2016 IEEE International Conference on Cloud Engineering Workshop, pp. 54-59. , IC2EW
dc.relation.referencesHwang, R.-H., Nguyen, V.-L., Lin, P.-C., Statefit: a security framework for sdn programmable data plane model (2018) 2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN), pp. 168-173. , IEEE
dc.relation.referencesHyun, S., Kim, J., Kim, H., Jeong, J., Hares, S., Dunbar, L., Farrel, A., Interface to network security functions for cloud-based security services (2018) IEEE Commun. Mag., 56 (1), pp. 171-178
dc.relation.referencesJain, R., Paul, S., Network virtualization and software defined networking for cloud computing: a survey (2013) IEEE Commun. Mag., 51 (11), pp. 24-31
dc.relation.referencesJarraya, Y., Madi, T., Debbabi, M., A survey and a layered taxonomy of software-defined networking (2014) IEEE Commun. Surv. Tutor., 16 (4), pp. 1955-1980
dc.relation.referencesJarschel, M., Oechsner, S., Schlosser, D., Pries, R., Goll, S., Tran-Gia, P., Modeling and performance evaluation of an openflow architecture (2011) Proceedings of the 23rd International Teletraffic Congress, International Teletraffic Congress, pp. 1-7
dc.relation.referencesJo, H., Nam, J., Shin, S., Nosarmor: Building a Secure Network Operating System, Security and Communication Networks (2018)
dc.relation.referencesJouini, M., Rabai, L.B.A., Aissa, A.B., Classification of security threats in information systems (2014) Procedia Comput. Sci., 32, pp. 489-496
dc.relation.referencesJouini, M., Rabai, L.B.A., Aissa, A.B., Classification of security threats in information systems (2014) Procedia Comput. Sci., 32, pp. 489-496
dc.relation.referencesKaur, S., Singh, J., Ghumman, N.S., Network programmability using pox controller (2014) ICCCS International Conference on Communication, Computing & Systems, IEEE, 138
dc.relation.referencesKendall, K.K.R., A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems (1999), Ph.D. thesis Massachusetts Institute of Technology
dc.relation.referencesKhan, S., Gani, A., Wahab, A.W.A., Abdelaziz, A., Ko, K., Khan, M.K., Guizani, M., Software-defined network forensics: motivation, potential locations, requirements, and challenges (2016) IEEE Network, 30 (6), pp. 6-13
dc.relation.referencesKhurshid, A., Zhou, W., Caesar, M., Godfrey, P., Veriflow: verifying network-wide invariants in real time (2012) Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 49-54. , ACM
dc.relation.referencesKim, H., Feamster, N., Improving network management with software defined networking (2013) IEEE Commun. Mag., 51 (2), pp. 114-119
dc.relation.referencesKreutz, D., Ramos, F., Verissimo, P., Towards secure and dependable software-defined networks (2013) Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 55-60. , ACM
dc.relation.referencesKreutz, D., Ramos, F.M.V., Verssimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S., Software-defined networking: a comprehensive survey (2015) Proc. IEEE, 103 (1), pp. 14-76
dc.relation.referencesKreutz, D., Verssimo, P.J.E., Magalhaes, C., Ramos, F.M.V., The kiss principle in software-defined networking: a framework for secure communications (2018) IEEE Secur. Priv., 16 (5), pp. 60-70
dc.relation.referencesLara, A., Kolasani, A., Ramamurthy, B., Network innovation using openflow: a survey (2014) IEEE Commun. Surv. Tutor., 16 (1), pp. 493-512
dc.relation.referencesLara, A., Kolasani, A., Ramamurthy, B., Network innovation using openflow: a survey (2014) IEEE Commun. Surv. Tutor., 16 (1), pp. 493-512
dc.relation.referencesLe, A., Dinh, P., Le, H., Tran, N.C., Flexible network-based intrusion detection and prevention system on software-defined networks (2015) 2015 International Conference on Advanced Computing and Applications, pp. 106-111. , ACOMP
dc.relation.referencesLee, W., Kim, N., Security policy scheme for an efficient security architecture in software-defined networking (2017) Information, 8 (2), p. 65
dc.relation.referencesLee, S., Kim, J., Shin, S., Porras, P., Yegneswaran, V., Athena: a framework for scalable anomaly detection in software-defined networks (2017) 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 249-260. , DSN
dc.relation.referencesLee, S., Yoon, C., Lee, C., Shin, S., Yegneswaran, V., Porras, P., Delta: a security assessment framework for software-defined networks (2017) Proceedings of the 2017 Network and Distributed System Security (NDSS) Symposium, 17
dc.relation.referencesLeng, J., Zhou, Y., Zhang, J., Tang, Y., Chen, K., Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense, Security and Communication Networks (2018)
dc.relation.referencesLi, C.-S., Liao, W., Software defined networks (2013) IEEE Commun. Mag., 51 (2). , 113113
dc.relation.referencesLin, Z., Tao, D., Wang, Z., Dynamic construction scheme for virtualization security service in software-defined networks (2017) Sensors, 17 (4), p. 920
dc.relation.referencesLindqvist, U., Jonsson, E., How to systematically classify computer security intrusions (1997) Proceedings. 1997 IEEE Symposium on Security and Privacy, pp. 154-163. , IEEE Cat. No. 97CB36097
dc.relation.referencesLiyanage, M., Ylianttila, M., Gurtov, A., Securing the control channel of software-defined mobile networks (2014) Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, pp. 1-6
dc.relation.referencesLoch, K.D., Carr, H.H., Warkentin, M.E., Threats to information systems: today's reality, yesterday's understanding (1992) MIS Q., 16 (2), pp. 173-186
dc.relation.referencesLorenz, C., Hock, D., Scherer, J., Durner, R., Kellerer, W., Gebert, S., Gray, N., Tran-Gia, P., An sdn/nfv-enabled enterprise network architecture offering fine-grained security policy enforcement (2017) IEEE Commun. Mag., 55 (3), pp. 217-223
dc.relation.referencesMatias, J., Garay, J., Toledo, N., Unzilla, J., Jacob, E., Toward an sdn-enabled nfv architecture (2015) IEEE Commun. Mag., 53 (4), pp. 187-193
dc.relation.referencesMattos, D.M.F., Duarte, O.C.M.B., Authflow: authentication and access control mechanism for software defined networking (2016) Ann. Telecommun., 71 (1112), pp. 607-615
dc.relation.referencesMcKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J., Openflow: enabling innovation in campus networks (2008) Comput. Commun. Rev., 38 (2), pp. 69-74
dc.relation.referencesNguyen, T.-H., Yoo, M., Analysis of link discovery service attacks in sdn controller (2017) 2017 International Conference on Information Networking, pp. 259-261. , ICOIN
dc.relation.referencesNunes, B.A.A., Mendonca, M., Nguyen, X.N., Obraczka, K., Turletti, T., A survey of software-defined networking: past, present, and future of programmable networks (2014) IEEE Commun. Surv. Tutor., 16 (3), pp. 1617-1634
dc.relation.referencesOehlert, P., Violating assumptions with fuzzing (2005) IEEE Secur. Priv., 3 (2), pp. 58-62
dc.relation.referencesOmnes, N., Bouillon, M., Fromentoux, G., Grand, O.L., A programmable and virtualized network it infrastructure for the internet of things: how can nfv sdn help for facing the upcoming challenges (2015) 2015 18th International Conference on Intelligence in Next Generation Networks, pp. 64-69
dc.relation.referencesOrdonez-Lucena, J., Ameigeiras, P., Lopez, D., Ramos-Munoz, J.J., Lorca, J., Folgueira, J., Network slicing for 5g with sdn/nfv: concepts, architectures, and challenges (2017) IEEE Commun. Mag., 55 (5), pp. 80-87
dc.relation.referencesPfaff, B., Lantz, B., Heller, B., Openflow Switch Specification (2014)
dc.relation.referencesPontarelli, S., Bonola, M., Bianchi, G., Smashing sdn built-in actions: programmable data plane packet manipulation in hardware (2017) 2017 IEEE Conference on Network Softwarization (NetSoft), pp. 1-9. , IEEE
dc.relation.referencesPorras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., Gu, G., A security enforcement kernel for openflow networks (2012) Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 121-126. , ACM
dc.relation.referencesPorras, P.A., Cheung, S., Fong, M.W., Skinner, K., Yegneswaran, V., Securing the software defined network control layer (2015) Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS), pp. 1-15. , Internet Society
dc.relation.referencesQiu, X., Zhang, K., Ren, Q., Global flow table: a convincing mechanism for security operations in sdn (2017) Comput. Network., 120, pp. 56-70
dc.relation.referencesRanjbar, A., Komu, M., Salmela, P., Aura, T., An sdn-based approach to enhance the end-to-end security: ssl/tls case study (2016) NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, pp. 281-288
dc.relation.referencesRawat, D.B., Reddy, S.R., Software defined networking architecture, security and energy efficiency: a survey (2017) IEEE Commun. Surv. Tutor., 19 (1), pp. 325-346
dc.relation.referencesRpke, C., Sdn Malware: Problems of Current Protection Systems and Potential Countermeasures (2016), Sicherheit Sicherheit, Schutz und Zuverlssigkeit
dc.relation.referencesRpke, C., Holz, T., Sdn rootkits: subverting network operating systems of software-defined networks (2015) International Workshop on Recent Advances in Intrusion Detection, pp. 339-356. , Springer
dc.relation.referencesSahay, R., Blanc, G., Zhang, Z., Toumi, K., Debar, H., Adaptive policy-driven attack mitigation in sdn (2017) Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, p. 4. , ACM
dc.relation.referencesSama, M.R., Said, S.B.H., Guillouard, K., Suciu, L., Enabling network programmability in lte/epc architecture using openflow (2014) 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pp. 389-396. , WiOpt
dc.relation.referencesSchehlmann, L., Abt, S., Baier, H., Blessing or curse? revisiting security aspects of software-defined networking (2014) 10th International Conference on Network and Service Management (CNSM) and Workshop, pp. 382-387
dc.relation.referencesScott-Hayward, S., Design and deployment of secure, robust, and resilient sdn controllers (2015) Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), pp. 1-5
dc.relation.referencesScott-Hayward, S., O'Callaghan, G., Sezer, S., Sdn security: a survey (2013) 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp. 1-7
dc.relation.referencesScott-Hayward, S., Natarajan, S., Sezer, S., A survey of security in software defined networks (2016) IEEE Commun. Surv. Tutor., 18 (1), pp. 623-654
dc.relation.referencesSezer, S., Scott-Hayward, S., Chouhan, P.K., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Rao, N., Are we ready for sdn? implementation challenges for software-defined networks (2013) IEEE Commun. Mag., 51 (7), pp. 36-43
dc.relation.referencesShaghaghi, A., Kafar, M.A., Buyya, R., Jha, S., (1804), Software-defined network (SDN) data plane security: Issues, solutions and future directions, CoRR abs/1804.00262. arXiv00262. URL
dc.relation.referencesShin, S., Yegneswaran, V., Porras, P., Gu, G., Avant-guard: scalable and vigilant switch flow management in software-defined networks (2013) Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 413-424. , ACM
dc.relation.referencesShin, S., Porras, P.A., Yegneswaran, V., Fong, M.W., Gu, G., Tyson, M., Fresco: modular composable security services for software-defined networks (2013) Proceedings of the 2013 Network and Distributed System Security Symposium (NDSS), , Internet Society
dc.relation.referencesShin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Kang, B.B., Rosemary: a robust, secure, and high-performance network operating system (2014) Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 78-89. , ACM
dc.relation.referencesShin, S., Xu, L., Hong, S., Gu, G., Enhancing network security through software defined networking (sdn) (2016) 2016 25th International Conference on Computer Communication and Networks, pp. 1-9. , ICCCN
dc.relation.referencesShu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A.V., Imran, M., Security in software-defined networking: threats and countermeasures (2016) Mobile Network. Appl., 21 (5), pp. 764-776
dc.relation.referencesSimmons, C., Ellis, C., Shiva, S., Dasgupta, D., Wu, Q., Avoidit: a cyber attack taxonomy (2014) 9th Annual Symposium on Information Assurance, pp. 2-12. , ASIA14
dc.relation.referencesSkowyra, R.W., Lapets, A., Bestavros, A., Kfoury, A., Verifiably-safe software-defined networks for cps (2013) Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, pp. 101-110. , ACM
dc.relation.referencesSloan, R.H., Warner, R., Unauthorized Access: the Crisis in Online Privacy and Security (2013), CRC press
dc.relation.referencesStallings, W., Software-defined networks and openflow (2013) Inter. Protocol J., 16 (1), pp. 2-14
dc.relation.referencesTantar, E., Tantar, A.-A., Kantor, M., Engel, T., On using cognition for anomaly detection in sdn (2018) EVOLVE-A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation VI, pp. 67-81. , Springer
dc.relation.referencesTootoonchian, A., Gorbunov, S., Ganjali, Y., Casado, M., Sherwood, R., (2012) On controller performance in software-defined networks., Hot-ICE, 12, pp. 1-6
dc.relation.referencesToseef, U., Zaalouk, A., Rothe, T., Broadbent, M., Pentikousis, K., C-bas: certificate-based aaa for sdn experimental facilities (2014) 2014 Third European Workshop on Software Defined Networks (EWSDN), pp. 91-96. , IEEE
dc.relation.referencesVan der Merwe, J., Kalmanek, C., Network programmability is the answer (2007) Workshop on Programmable Routers for the Extensible Services of Tomorrow (PRESTO 2007), Princeton, NJ
dc.relation.referencesVaughan-Nichols, S.J., Openflow: the next generation of the network? (2011) Computer, 44 (8), pp. 13-15
dc.relation.referencesWen, X., Chen, Y., Hu, C., Shi, C., Wang, Y., Towards a secure controller platform for openflow applications (2013) Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 171-172. , ACM
dc.relation.referencesWrona, K., Oudkerk, S., Szwaczyk, S., Amanowicz, M., Content-based security and protected core networking with software-defined networks (2016) IEEE Commun. Mag., 54 (10), pp. 138-144
dc.relation.referencesWrona, K., Amanowicz, M., Szwaczyk, S., Gierowski, K., Sdn testbed for validation of cross-layer data-centric security policies (2017) 2017 International Conference on Military Communications and Information Systems, pp. 1-6. , ICMCIS
dc.relation.referencesXing, T., Huang, D., Xu, L., Chung, C.J., Khatkar, P., Snortflow: a openflow-based intrusion prevention system in cloud environment (2013) 2013 Second GENI Research and Educational Experiment Workshop, pp. 89-92
dc.relation.referencesYan, Z., Zhang, P., Vasilakos, A.V., A security and trust framework for virtualized networks and software-defined networking (2016) Secur. Commun. Network., 9 (16), pp. 3059-3069
dc.relation.referencesYoon, C., Lee, S., Kang, H., Park, T., Shin, S., Yegneswaran, V., Porras, P., Gu, G., Flow wars: systemizing the attack surface and defenses in software-defined networks (2017) IEEE/ACM Trans. Netw., 25 (6), pp. 3514-3530
dc.relation.referencesYoon, C., Shin, S., Porras, P., Yegneswaran, V., Kang, H., Fong, M., O'Connor, B., Vachuska, T., A security-mode for carrier-grade sdn controllers (2017) Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 461-473. , ACM
dc.relation.referencesZhang, S.-H., Meng, X.-X., Wang, L.-H., Sdnforensics: a comprehensive forensics framework for software defined network (2017) Development, 3 (4), p. 5
dc.type.versioninfo:eu-repo/semantics/publishedVersion
dc.type.driverinfo:eu-repo/semantics/article


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem