A comprehensive survey of vulnerability and information security in SDN
R Deb, S Roy - Computer Networks, 2022 - Elsevier
SDN changes the networking vision with an impressive thought of segregating the
networking control from the data management hardware and brings new functionalities such …
networking control from the data management hardware and brings new functionalities such …
A topical review on machine learning, software defined networking, internet of things applications: Research limitations and challenges
In recent years, rapid development has been made to the Internet of Things communication
technologies, infrastructure, and physical resources management. These developments and …
technologies, infrastructure, and physical resources management. These developments and …
Survey and taxonomy of adversarial reconnaissance techniques
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …
vulnerabilities in people and systems. The key to the success of these attacks is information …
Software‐defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutions
AM Abdelrahman, JJPC Rodrigues… - International Journal …, 2021 - Wiley Online Library
Software‐defined networking (SDN) is an agile, modern networking approach that facilitates
innovations in the networking paradigm. The abstracted and centralized network operating …
innovations in the networking paradigm. The abstracted and centralized network operating …
Limitations of openflow topology discovery protocol
OpenFlow Discovery Protocol (OFDP) is the defacto protocol used by OpenFlow controllers
to discover the underlying topology. In this paper, we show that OFDP has some serious …
to discover the underlying topology. In this paper, we show that OFDP has some serious …
[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …
asset, and vulnerability management. Estimating the operating system via network traffic …
Passive os fingerprinting methods in the jungle of wireless networks
Operating system fingerprinting methods are well-known in the domain of static networks
and managed environments. Yet few studies tackled this challenge in real networks, where …
and managed environments. Yet few studies tackled this challenge in real networks, where …
sOFTDP: Secure and efficient topology discovery protocol for SDN
Topology discovery is one of the most critical tasks of Software-Defined Network (SDN)
controllers. Current SDN controllers use the OpenFlow Discovery Protocol (OFDP) as the de …
controllers. Current SDN controllers use the OpenFlow Discovery Protocol (OFDP) as the de …
sOFTDP: Secure and efficient OpenFlow topology discovery protocol
Topology discovery is one of the most critical tasks of Software-Defined Network (SDN)
controllers. Current SDN controllers use the OpenFlow Discovery Protocol (OFDP) as the de …
controllers. Current SDN controllers use the OpenFlow Discovery Protocol (OFDP) as the de …
An intrusion detection system based on genetic algorithm for software-defined networks
X Zhao, H Su, Z Sun - Mathematics, 2022 - mdpi.com
A SDN (Software-Defined Network) separates the control layer from the data layer to realize
centralized network control and improve the scalability and the programmability. SDN also …
centralized network control and improve the scalability and the programmability. SDN also …