Ortiz et al., 2019 - Google Patents
Experimental Security Analysis of Controller Software in SDNs: A ReviewOrtiz et al., 2019
View PDF- Document ID
- 2899297882254824186
- Author
- Ortiz T
- Kimura B
- Ueyama J
- Rosset V
- Publication year
- Publication venue
- arXiv preprint arXiv:1906.09546
External Links
Snippet
The software defined networking paradigm relies on the programmability of the network to automatically perform management and reconfiguration tasks. The result of adopting this programmability feature is twofold: first by designing new solutions and, second, by …
- 238000004458 analytical method 0 title abstract description 60
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Eliyan et al. | DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges | |
Jimenez et al. | A survey of the main security issues and solutions for the SDN architecture | |
Shaghaghi et al. | Software-defined network (SDN) data plane security: issues, solutions, and future directions | |
Shu et al. | Security in software-defined networking: Threats and countermeasures | |
Deb et al. | A comprehensive survey of vulnerability and information security in SDN | |
Akhunzada et al. | Secure and dependable software defined networks | |
US11108830B2 (en) | System for coordinative security across multi-level networks | |
Dhawan et al. | Sphinx: detecting security attacks in software-defined networks. | |
Krishnan et al. | OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure | |
US10560434B2 (en) | Automated honeypot provisioning system | |
Xing et al. | Snortflow: A openflow-based intrusion prevention system in cloud environment | |
Scott-Hayward et al. | A survey of security in software defined networks | |
Akhunzada et al. | Securing software defined networks: taxonomy, requirements, and open issues | |
CN106576099B (en) | Support the data center architecture of attack detecting and alleviation | |
Abdelrahman et al. | Software‐defined networking security for private data center networks and clouds: vulnerabilities, attacks, countermeasures, and solutions | |
US10826933B1 (en) | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints | |
Jero et al. | Beads: Automated attack discovery in openflow-based sdn systems | |
Gill et al. | SECURE: Self-protection approach in cloud resource management | |
CA2895522A1 (en) | System and method for monitoring data in a client environment | |
Irfan et al. | A framework for cloud forensics evidence collection and analysis using security information and event management | |
Zeng et al. | Full-stack vulnerability analysis of the cloud-native platform | |
Li et al. | Evaluation of security vulnerabilities by using ProtoGENI as a launchpad | |
Ahmed et al. | Modelling cyber security for software-defined networks those grow strong when exposed to threats: Analysis and propositions | |
Khan et al. | FML: A novel forensics management layer for software defined networks | |
Abd Elazim et al. | Software defined networking: attacks and countermeasures |