메뉴 건너뛰기




Volumn , Issue , 2013, Pages

SDN security: A survey

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; INFORMATION SYSTEMS;

EID: 84893626159     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SDN4FNS.2013.6702553     Document Type: Conference Paper
Times cited : (409)

References (35)
  • 7
    • 84896800526 scopus 로고    scopus 로고
    • April 2013. [Online]. Available
    • R. Kloeti, "OpenFlow: A Security Analysis," April 2013. [Online]. Available: ftp://yosemite.ee.ethz.ch/pub/students/2012-HS/MA-2012-20- signed.pdf
    • OpenFlow: A Security Analysis
    • Kloeti, R.1
  • 8
    • 33847258361 scopus 로고    scopus 로고
    • Threat modeling-uncover security design flaws using the stride approach
    • S. Hernan, S. Lambert, T. Ostwald, and A. Shostack, "Threat modeling-uncover security design flaws using the stride approach," MSDN Magazine-Louisville, pp. 68-75, 2006.
    • (2006) MSDN Magazine-Louisville , pp. 68-75
    • Hernan, S.1    Lambert, S.2    Ostwald, T.3    Shostack, A.4
  • 9
    • 84893562761 scopus 로고    scopus 로고
    • Open Networking Foundation. [Online]. Available
    • "OpenFlow Switch Specification Version 1.3.2," Open Networking Foundation. [Online]. Available: https://www.opennetworking.org
    • OpenFlow Switch Specification Version 1.3.2
  • 13
    • 84883735924 scopus 로고    scopus 로고
    • A Slick control plane for network middleboxes
    • [Online]. Available
    • B. Anwer, T. Benson, N. Feamster, D. Levin, and J. Rexford, "A Slick Control Plane for Network Middleboxes," Open Networking Summit, 2013. [Online]. Available: http://nextstep-esolutions.com/Clients/ONS2.0/pdf/2013/ research-track/poster papers/final/ons2013-final51.pdf
    • (2013) Open Networking Summit
    • Anwer, B.1    Benson, T.2    Feamster, N.3    Levin, D.4    Rexford, J.5
  • 18
    • 85043718049 scopus 로고    scopus 로고
    • Extensible and scalable network monitoring using opensafe
    • J. R. Ballard, I. Rae, and A. Akella, "Extensible and scalable network monitoring using opensafe," Proc.INM/WREN, 2010.
    • (2010) Proc.INM/WREN
    • Ballard, J.R.1    Rae, I.2    Akella, A.3
  • 19
    • 84874562245 scopus 로고    scopus 로고
    • CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
    • S. Shin and G. Gu, "CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)," in 20th IEEE International Conference on Network Protocols (ICNP). IEEE, 2012, pp. 1-6.
    • (2012) 20th IEEE International Conference on Network Protocols (ICNP). IEEE , pp. 1-6
    • Shin, S.1    Gu, G.2
  • 24
    • 84857255431 scopus 로고    scopus 로고
    • Revisiting traffic anomaly detection using software defined networking
    • Springer
    • S. A. Mehdi, J. Khalid, and S. A. Khayam, "Revisiting traffic anomaly detection using software defined networking," in Recent Advances in Intrusion Detection. Springer, 2011, pp. 161-180.
    • (2011) Recent Advances in Intrusion Detection , pp. 161-180
    • Mehdi, S.A.1    Khalid, J.2    Khayam, S.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.