Rietz et al., 2018 - Google Patents
Research Article An SDN-Based Approach to Ward Off LAN AttacksRietz et al., 2018
View PDF- Document ID
- 4324719674538783529
- Author
- Rietz R
- Cwalinski R
- König H
- Brinner A
- Publication year
External Links
Snippet
Research Article An SDN-Based Approach to Ward Off LAN Attacks Page 1 Research Article An
SDN-Based Approach to Ward Off LAN Attacks René Rietz,1 Radoslaw Cwalinski ,1 Hartmut
König ,1 and Andreas Brinner 2 1Brandenburg University of Technology, Department of …
- 238000013459 approach 0 title description 30
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7360245B1 (en) | Method and system for filtering spoofed packets in a network | |
Davies et al. | IPv6 transition/co-existence security considerations | |
US8055800B1 (en) | Enforcing host routing settings on a network device | |
US7792990B2 (en) | Remote client remediation | |
Anu et al. | A survey on sniffing attacks on computer networks | |
US20080189769A1 (en) | Secure network switching infrastructure | |
US8576845B2 (en) | Method and apparatus for avoiding unwanted data packets | |
US20080267179A1 (en) | Packet processing | |
Mukkamala et al. | A survey on the different firewall technologies | |
Feng et al. | {Off-Path} Network Traffic Manipulation via Revitalized {ICMP} Redirect Attacks | |
Rietz et al. | An SDN‐Based Approach to Ward Off LAN Attacks | |
Abdulla | Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms | |
McPherson et al. | Source address validation improvement (SAVI) threat scope | |
Convery et al. | Ipv6 and ipv4 threat comparison and best-practice evaluation (v1. 0) | |
ElShafee et al. | Design and analysis of data link impersonation attack for wired LAN application layer services | |
Arjuman et al. | A review on ICMPv6 vulnerabilities and its mitigation techniques: Classification and art | |
Shrivastava et al. | The detection & defense of DoS & DDos attack: a technical overview | |
Shah et al. | Security Issues in Next Generation IP and Migration Networks | |
Najjar et al. | Ipv6 change threats behavior | |
Alabady | Design and implementation of a network security model using static VLAN and AAA server | |
Sharma | Ipv6 and ipv4 security challenge analysis and best-practice scenario | |
Liu et al. | Study on attacking and defending techniques in IPv6 networks | |
Rietz et al. | Research Article An SDN-Based Approach to Ward Off LAN Attacks | |
Shanmugaraja et al. | Accessible methods to mitigate security attacks on ipv4 to ipv6 transitions | |
Roeckl et al. | Stateful inspection firewalls |