FRESCO: Modular Composable Security Services for Software-Defined Networks S Shin, P Porras, V Yegneswaran, M Fong, G Gu, M Tyson Internet Society NDSS (Feb. 2013). To appear, 2013 | 934 | 2013 |
Avant-guard: Scalable and vigilant switch flow management in software-defined networks S Shin, V Yegneswaran, P Porras, G Gu Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 832 | 2013 |
A security enforcement kernel for OpenFlow networks P Porras, S Shin, V Yegneswaran, M Fong, M Tyson, G Gu Proceedings of the first workshop on Hot topics in software defined networks …, 2012 | 798 | 2012 |
Attacking software-defined networks: A first feasibility study S Shin, G Gu Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013 | 465 | 2013 |
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter C Yang, R Harkreader, J Zhang, S Shin, G Gu Proceedings of the 21st international conference on World Wide Web, 71-80, 2012 | 426 | 2012 |
Rosemary: A robust, secure, and high-performance network operating system S Shin, Y Song, T Lee, S Lee, J Chung, P Porras, V Yegneswaran, J Noh, ... Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 342 | 2014 |
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) S Shin, G Gu 2012 20th IEEE international conference on network protocols (ICNP), 1-6, 2012 | 324 | 2012 |
Model checking invariant security properties in OpenFlow S Son, S Shin, V Yegneswaran, P Porras, G Gu 2013 IEEE international conference on communications (ICC), 1974-1979, 2013 | 229 | 2013 |
Enhancing network security through software defined networking (SDN) S Shin, L Xu, S Hong, G Gu 2016 25th international conference on computer communication and networks …, 2016 | 177 | 2016 |
Delta: A security assessment framework for software-defined networks. S Lee, C Yoon, C Lee, S Shin, V Yegneswaran, PA Porras NDSS, 2017 | 161 | 2017 |
Enabling security functions with SDN: A feasibility study C Yoon, T Park, S Lee, H Kang, S Shin, Z Zhang Computer Networks 85, 19-35, 2015 | 159 | 2015 |
Flow wars: Systemizing the attack surface and defenses in software-defined networks C Yoon, S Lee, H Kang, T Park, S Shin, V Yegneswaran, P Porras, G Gu IEEE/ACM Transactions on Networking 25 (6), 3514-3530, 2017 | 154 | 2017 |
Conficker and beyond: a large-scale empirical study S Shin, G Gu Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 145 | 2010 |
Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web S Lee, C Yoon, H Kang, Y Kim, Y Kim, D Han, S Son, S Shin Proceedings 2019 Network and Distributed System Security Symposium, 2019 | 111 | 2019 |
A large-scale empirical study of conficker S Shin, G Gu, N Reddy, CP Lee IEEE Transactions on Information Forensics and Security 7 (2), 676-690, 2011 | 105 | 2011 |
Athena: A framework for scalable anomaly detection in software-defined networks S Lee, J Kim, S Shin, P Porras, V Yegneswaran 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 90 | 2017 |
A first step toward network security virtualization: From concept to prototype S Shin, H Wang, G Gu IEEE Transactions on Information Forensics and Security 10 (10), 2236-2249, 2015 | 88 | 2015 |
Malware prevalence in the KaZaA file-sharing network S Shin, J Jung, H Balakrishnan Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 333-338, 2006 | 86 | 2006 |
Network intrusion detection and prevention system and method thereof SW Shin, J Oh, KY Kim, JS Jang, SW Sohn US Patent 7,565,693, 2009 | 81 | 2009 |
EFFORT: efficient and effective bot malware detection S Shin, Z Xu, G Gu 2012 Proceedings IEEE INFOCOM, 2846-2850, 2012 | 74 | 2012 |