-
1
-
-
84883290864
-
B4: Experience with a globally-deployed software defined wan
-
ACM
-
S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S. Venkata, J. Wanderer, J. Zhou, and M. Zhu, "B4: Experience with a globally-deployed software defined wan," in Proceedings of the ACM SIGCOMM 2013 conference. ACM, 2013, pp. 3-14.
-
(2013)
Proceedings of the ACM SIGCOMM 2013 Conference
, pp. 3-14
-
-
Jain, S.1
Kumar, A.2
Mandal, S.3
Ong, J.4
Poutievski, L.5
Singh, A.6
Venkata, S.7
Wanderer, J.8
Zhou, J.9
Zhu, M.10
-
2
-
-
84880545424
-
Are we ready for SDN? Implementation challenges for software-defined networks
-
S. Sezer, S. Scott-Hayward, P. Chouhan, B. Fraser, D. Lake, J. Finnegan, N. Viljoen, M. Miller, and N. Rao, "Are we ready for SDN? Implementation challenges for software-defined networks," Communications Magazine, IEEE, vol. 51, no. 7, 2013.
-
Communications Magazine, IEEE
, vol.51
, Issue.7
, pp. 2013
-
-
Sezer, S.1
Scott-Hayward, S.2
Chouhan, P.3
Fraser, B.4
Lake, D.5
Finnegan, J.6
Viljoen, N.7
Miller, M.8
Rao, N.9
-
5
-
-
44249126961
-
Sane: A protection architecture for enterprise networks
-
M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker, "Sane: A protection architecture for enterprise networks," in USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.J.4
Boneh, D.5
McKeown, N.6
Shenker, S.7
-
6
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
ACM
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, "Ethane: Taking control of the enterprise," in ACM SIGCOMM Computer Communication Review, vol. 37, no. 4. ACM, 2007, pp. 1-12.
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, Issue.4
, pp. 1-12
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
7
-
-
84896800526
-
-
April 2013. [Online]. Available
-
R. Kloeti, "OpenFlow: A Security Analysis," April 2013. [Online]. Available: ftp://yosemite.ee.ethz.ch/pub/students/2012-HS/MA-2012-20- signed.pdf
-
OpenFlow: A Security Analysis
-
-
Kloeti, R.1
-
8
-
-
33847258361
-
Threat modeling-uncover security design flaws using the stride approach
-
S. Hernan, S. Lambert, T. Ostwald, and A. Shostack, "Threat modeling-uncover security design flaws using the stride approach," MSDN Magazine-Louisville, pp. 68-75, 2006.
-
(2006)
MSDN Magazine-Louisville
, pp. 68-75
-
-
Hernan, S.1
Lambert, S.2
Ostwald, T.3
Shostack, A.4
-
9
-
-
84893562761
-
-
Open Networking Foundation. [Online]. Available
-
"OpenFlow Switch Specification Version 1.3.2," Open Networking Foundation. [Online]. Available: https://www.opennetworking.org
-
OpenFlow Switch Specification Version 1.3.2
-
-
-
10
-
-
84883734157
-
OpenFlow vulnerability assessment
-
ACM
-
K. Benton, L. J. Camp, and C. Small, "OpenFlow Vulnerability Assessment," in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013, pp. 151-152.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
, pp. 151-152
-
-
Benton, K.1
Camp, L.J.2
Small, C.3
-
11
-
-
84883671159
-
Towards secure and dependable software-defined networks
-
ACM
-
D. Kreutz, F. Ramos, and P. Verissimo, "Towards secure and dependable software-defined networks," in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013, pp. 55-60.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
, pp. 55-60
-
-
Kreutz, D.1
Ramos, F.2
Verissimo, P.3
-
12
-
-
84863164091
-
Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad
-
IEEE
-
D. Li, X. Hong, and J. Bowman, "Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad," in Global Telecommunications Conference (GLOBECOM 2011). IEEE, 2011, pp. 1-6.
-
(2011)
Global Telecommunications Conference (GLOBECOM 2011)
, pp. 1-6
-
-
Li, D.1
Hong, X.2
Bowman, J.3
-
13
-
-
84883735924
-
A Slick control plane for network middleboxes
-
[Online]. Available
-
B. Anwer, T. Benson, N. Feamster, D. Levin, and J. Rexford, "A Slick Control Plane for Network Middleboxes," Open Networking Summit, 2013. [Online]. Available: http://nextstep-esolutions.com/Clients/ONS2.0/pdf/2013/ research-track/poster papers/final/ons2013-final51.pdf
-
(2013)
Open Networking Summit
-
-
Anwer, B.1
Benson, T.2
Feamster, N.3
Levin, D.4
Rexford, J.5
-
14
-
-
84883696109
-
Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions
-
ACM
-
S. Fayazbakhsh, V. Sekar, M. Yu, and J. Mogul, "FlowTags: Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions," in Proceedings of the second workshop on Hot topics in software defined networks. ACM, 2013.
-
(2013)
Proceedings of the Second Workshop on Hot Topics in Software Defined Networks
-
-
Fayazbakhsh, S.1
Sekar, V.2
Yu, M.3
Mogul, J.4
-
15
-
-
84883284152
-
SIMPLE-fying middlebox policy enforcement using SDN
-
August 2013
-
Z. A. Qazi, C.-C. Tu, L. Chiang, R. Miao, V. Sekar, and M. Yu, "SIMPLE-fying Middlebox Policy Enforcement Using SDN." ACM SIGCOMM, August 2013.
-
ACM SIGCOMM
-
-
Qazi, Z.A.1
Tu, C.-C.2
Chiang, L.3
Miao, R.4
Sekar, V.5
Yu, M.6
-
16
-
-
84866521295
-
Openflow random host mutation: Transparent moving target defense using software defined networking
-
ACM
-
J. H. Jafarian, E. Al-Shaer, and Q. Duan, "Openflow random host mutation: transparent moving target defense using software defined networking," in Proceedings of the first workshop on Hot topics in software defined networks. ACM, 2012, pp. 127-132.
-
(2012)
Proceedings of the First Workshop on Hot Topics in Software Defined Networks
, pp. 127-132
-
-
Jafarian, J.H.1
Al-Shaer, E.2
Duan, Q.3
-
17
-
-
79955041204
-
Lightweight DDoS flooding attack detection using NOX/OpenFlow
-
IEEE
-
R. Braga, E. Mota, and A. Passito, "Lightweight DDoS flooding attack detection using NOX/OpenFlow," in IEEE 35th Conference on Local Computer Networks (LCN). IEEE, 2010, pp. 408-415.
-
(2010)
IEEE 35th Conference on Local Computer Networks (LCN)
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
18
-
-
85043718049
-
Extensible and scalable network monitoring using opensafe
-
J. R. Ballard, I. Rae, and A. Akella, "Extensible and scalable network monitoring using opensafe," Proc.INM/WREN, 2010.
-
(2010)
Proc.INM/WREN
-
-
Ballard, J.R.1
Rae, I.2
Akella, A.3
-
19
-
-
84874562245
-
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
-
S. Shin and G. Gu, "CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)," in 20th IEEE International Conference on Network Protocols (ICNP). IEEE, 2012, pp. 1-6.
-
(2012)
20th IEEE International Conference on Network Protocols (ICNP). IEEE
, pp. 1-6
-
-
Shin, S.1
Gu, G.2
-
20
-
-
77954339615
-
Resonance: Dynamic access control for enterprise networks
-
ACM
-
A. K. Nayak, A. Reimers, N. Feamster, and R. Clark, "Resonance: dynamic access control for enterprise networks," in Proceedings of the 1st ACM workshop on Research on enterprise networking. ACM, 2009, pp. 11-18.
-
(2009)
Proceedings of the 1st ACM Workshop on Research on Enterprise Networking
, pp. 11-18
-
-
Nayak, A.K.1
Reimers, A.2
Feamster, N.3
Clark, R.4
-
21
-
-
77954334703
-
Delegating network security with more information
-
ACM
-
J. Naous, R. Stutsman, D. Mazieres, N. McKeown, and N. Zeldovich, "Delegating network security with more information," in Proceedings of the 1st ACM workshop on Research on enterprise networking. ACM, 2009, pp. 19-26.
-
(2009)
Proceedings of the 1st ACM Workshop on Research on Enterprise Networking
, pp. 19-26
-
-
Naous, J.1
Stutsman, R.2
Mazieres, D.3
McKeown, N.4
Zeldovich, N.5
-
24
-
-
84857255431
-
Revisiting traffic anomaly detection using software defined networking
-
Springer
-
S. A. Mehdi, J. Khalid, and S. A. Khayam, "Revisiting traffic anomaly detection using software defined networking," in Recent Advances in Intrusion Detection. Springer, 2011, pp. 161-180.
-
(2011)
Recent Advances in Intrusion Detection
, pp. 161-180
-
-
Mehdi, S.A.1
Khalid, J.2
Khayam, S.A.3
-
25
-
-
85013634872
-
A NICE way to test OpenFlow applications
-
M. Canini, D. Venzano, P. Peresini, D. Kostic, and J. Rexford, "A NICE way to test OpenFlow applications," in Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, 2012.
-
(2012)
Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation
-
-
Canini, M.1
Venzano, D.2
Peresini, P.3
Kostic, D.4
Rexford, J.5
-
27
-
-
78149258537
-
Flowvisor: A network virtualization layer
-
R. Sherwood, G. Gibb, K. Yap, G. Appenzeller, M. Casado, N. McKeown, and G. Parulkar, "Flowvisor: A network virtualization layer," OpenFlow Switch Consortium, Tech.Rep, 2009.
-
(2009)
OpenFlow Switch Consortium, Tech.Rep
-
-
Sherwood, R.1
Gibb, G.2
Yap, K.3
Appenzeller, G.4
Casado, M.5
McKeown, N.6
Parulkar, G.7
-
28
-
-
84893622503
-
-
[Online] Available
-
S. Son, S. Shin, V. Yegneswaran, P. Porras, and G. Gu, "Model Checking Invariant Security Properties in OpenFlow." [Online]. Available: http://faculty.cse.tamu.edu/guofei/paper/Flover-ICC13.pdf
-
Model Checking Invariant Security Properties in OpenFlow
-
-
Son, S.1
Shin, S.2
Yegneswaran, V.3
Porras, P.4
Gu, G.5
-
29
-
-
84893267876
-
VeriFlow: Verifying network-wide invariants in real time
-
A. Khurshid, W. Zhou, M. Caesar, and P. Godfrey, "VeriFlow: Verifying network-wide invariants in real time," ACM SIGCOMM Computer Communication Review, vol. 42, no. 4, pp. 467-472, 2012.
-
(2012)
ACM SIGCOMM Computer Communication Review
, vol.42
, Issue.4
, pp. 467-472
-
-
Khurshid, A.1
Zhou, W.2
Caesar, M.3
Godfrey, P.4
-
30
-
-
77954330731
-
Expressing and enforcing flow-based network security policies
-
T. Hinrichs, N. Gude, M. Casado, J. Mitchell, and S. Shenker, "Expressing and enforcing flow-based network security policies," University of Chicago, Tech.Rep, 2008.
-
(2008)
University of Chicago, Tech.Rep
-
-
Hinrichs, T.1
Gude, N.2
Casado, M.3
Mitchell, J.4
Shenker, S.5
-
31
-
-
84893603300
-
Splendid isolation: Language-based security for softwaredefined networks
-
ACM
-
C. Schlesinger, A. Story, S. Gutz, N. Foster, and D. Walker, "Splendid isolation: Language-based security for softwaredefined networks," in Proceedings of the first workshop on Hot topics in software defined networks. ACM, 2012, pp. 79-84.
-
(2012)
Proceedings of the First Workshop on Hot Topics in Software Defined Networks
, pp. 79-84
-
-
Schlesinger, C.1
Story, A.2
Gutz, S.3
Foster, N.4
Walker, D.5
-
32
-
-
84893570087
-
FRESCO: Modular composable security services for software-defined networks
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson, "FRESCO: Modular composable security services for software-defined networks," in Proceedings of Network and Distributed Security Symposium, 2013.
-
(2013)
Proceedings of Network and Distributed Security Symposium
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
33
-
-
84866518191
-
A security enforcement kernel for OpenFlow networks
-
ACM
-
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, "A security enforcement kernel for OpenFlow networks," in Proceedings of the first workshop on Hot topics in software defined networks. ACM, 2012, pp. 121-126.
-
(2012)
Proceedings of the First Workshop on Hot Topics in Software Defined Networks
, pp. 121-126
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
34
-
-
84877624157
-
Verifiably-safe software-defined networks for CPS
-
ACM
-
R. W. Skowyra, A. Lapets, A. Bestavros, and A. Kfoury, "Verifiably-safe software-defined networks for CPS," in Proceedings of the 2nd ACM international conference on High confidence networked systems. ACM, 2013, pp. 101-110.
-
(2013)
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems
, pp. 101-110
-
-
Skowyra, R.W.1
Lapets, A.2
Bestavros, A.3
Kfoury, A.4
-
35
-
-
84866494980
-
Where is the debugger for my software-defined network?
-
ACM
-
N. Handigol, B. Heller, V. Jeyakumar, D. Mazires, and N. McKeown, "Where is the debugger for my software-defined network?" in Proceedings of the first workshop on Hot topics in software defined networks. ACM, 2012, pp. 55-60.
-
(2012)
Proceedings of the First Workshop on Hot Topics in Software Defined Networks
, pp. 55-60
-
-
Handigol, N.1
Heller, B.2
Jeyakumar, V.3
Mazires, D.4
McKeown, N.5
|