A comprehensive survey of vulnerability and information security in SDN

R Deb, S Roy - Computer Networks, 2022 - Elsevier
SDN changes the networking vision with an impressive thought of segregating the
networking control from the data management hardware and brings new functionalities such …

A topical review on machine learning, software defined networking, internet of things applications: Research limitations and challenges

Imran, Z Ghaffar, A Alshahrani, M Fayaz, AM Alghamdi… - Electronics, 2021 - mdpi.com
In recent years, rapid development has been made to the Internet of Things communication
technologies, infrastructure, and physical resources management. These developments and …

Survey and taxonomy of adversarial reconnaissance techniques

S Roy, N Sharmin, JC Acosta, C Kiekintveld… - ACM Computing …, 2022 - dl.acm.org
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …

Software‐defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions

AM Abdelrahman, JJPC Rodrigues… - International Journal …, 2021 - Wiley Online Library
Software‐defined networking (SDN) is an agile, modern networking approach that facilitates
innovations in the networking paradigm. The abstracted and centralized network operating …

Limitations of openflow topology discovery protocol

A Azzouni, NTM Trang, R Boutaba… - 2017 16th annual …, 2017 - ieeexplore.ieee.org
OpenFlow Discovery Protocol (OFDP) is the defacto protocol used by OpenFlow controllers
to discover the underlying topology. In this paper, we show that OFDP has some serious …

[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges

M Laštovička, M Husák, P Velan, T Jirsík, P Čeleda - Computer Networks, 2023 - Elsevier
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …

Passive os fingerprinting methods in the jungle of wireless networks

M Lastovicka, T Jirsik, P Celeda… - NOMS 2018-2018 …, 2018 - ieeexplore.ieee.org
Operating system fingerprinting methods are well-known in the domain of static networks
and managed environments. Yet few studies tackled this challenge in real networks, where …

sOFTDP: Secure and efficient topology discovery protocol for SDN

A Azzouni, R Boutaba, NTM Trang, G Pujolle - arXiv preprint arXiv …, 2017 - arxiv.org
Topology discovery is one of the most critical tasks of Software-Defined Network (SDN)
controllers. Current SDN controllers use the OpenFlow Discovery Protocol (OFDP) as the de …

sOFTDP: Secure and efficient OpenFlow topology discovery protocol

A Azzouni, R Boutaba, NTM Trang… - NOMS 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
Topology discovery is one of the most critical tasks of Software-Defined Network (SDN)
controllers. Current SDN controllers use the OpenFlow Discovery Protocol (OFDP) as the de …

An intrusion detection system based on genetic algorithm for software-defined networks

X Zhao, H Su, Z Sun - Mathematics, 2022 - mdpi.com
A SDN (Software-Defined Network) separates the control layer from the data layer to realize
centralized network control and improve the scalability and the programmability. SDN also …