A comprehensive survey on SDN security: threats, mitigations, and future directions
Nowadays, security threats on Software Defined Network SDN architectures are similar to
traditional networks. However, the profile of these threats changes with SDN. For example, a …
traditional networks. However, the profile of these threats changes with SDN. For example, a …
Detection and mitigation of DoS attacks in software defined networks
The introduction of software-defined networking (SDN) has emerged as a new network
paradigm for network innovations. By decoupling the control plane from the data plane in …
paradigm for network innovations. By decoupling the control plane from the data plane in …
Lessons learnt on reproducibility in machine learning based android malware detection
A well-known curse of computer security research is that it often produces systems that,
while technically sound, fail operationally. To overcome this curse, the community generally …
while technically sound, fail operationally. To overcome this curse, the community generally …
Robust network traffic identification with graph matching
Network traffic identification is of great value as an effective way for network management.
Typically, intelligent classifiers are deployed for advanced network protection, including …
Typically, intelligent classifiers are deployed for advanced network protection, including …
[PDF][PDF] 软件定义网络中资源消耗型攻击及防御综述
徐建峰, 王利明, 徐震 - 信息安全学报, 2020 - 159.226.95.92
摘要在传统网络中, 集成多种网络功能的控制平面和负责转发数据包的数据平面是紧密耦合的,
并且通常嵌入在一个专用设备中, 这严重限制了网络管理的灵活性和网络服务的创新性 …
并且通常嵌入在一个专用设备中, 这严重限制了网络管理的灵活性和网络服务的创新性 …
Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering
As a company grows, so does its infrastructure—especially its information technology (IT)
infrastructure. Maintaining a transparent and manageable firewall policy during this period of …
infrastructure. Maintaining a transparent and manageable firewall policy during this period of …
Implementation method of non-bypassable PC application firewalls using virtualization technologies
A Shoji, Y Shinjo - 2023 IEEE International Conference on High …, 2023 - ieeexplore.ieee.org
Modern complex PC applications access the Internet and can produce unwanted network
traffic. Application firewalls or personal firewalls can monitor communications on users' PCs …
traffic. Application firewalls or personal firewalls can monitor communications on users' PCs …
Balanceamento entre segurança e desempenho na comunicação entre os planos de controle e dados em redes definidas por software
AMS Orozco - 2018 - tede2.pucrs.br
Nowadays, cryptography is being widely used as a standard for securing data exchange on
the Internet. For instance, in software-defined networking, it is possible to apply cryptography …
the Internet. For instance, in software-defined networking, it is possible to apply cryptography …