메뉴 건너뛰기




Volumn , Issue , 2013, Pages

OpenFlow: A security analysis

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY SYSTEMS;

EID: 84896744708     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2013.6733671     Document Type: Conference Paper
Times cited : (188)

References (24)
  • 1
    • 84896768805 scopus 로고    scopus 로고
    • NOXRepo.org
    • NOXRepo.org, "NOX," http://www.noxrepo.org/.
    • NOX
  • 2
    • 68649129121 scopus 로고    scopus 로고
    • OpenFlow: Enabling innovation in campus networks
    • Mar.
    • N. McKeown et al., "OpenFlow: enabling innovation in campus networks," SIGCOMM CCR, Mar. 2008.
    • (2008) SIGCOMM CCR
    • McKeown, N.1
  • 4
    • 84896778518 scopus 로고    scopus 로고
    • U. Hoelzle, "OpenFlow@Google," http://opennetsummit.org/ archives/apr12/hoelzle-tue-openflow.pdf.
    • OpenFlow@Google
    • Hoelzle, U.1
  • 7
    • 84896754102 scopus 로고    scopus 로고
    • "SDN applications," http://searchsdn.techtarget.com/resources/ SDN-applications.
    • SDN Applications
  • 8
    • 84894125380 scopus 로고    scopus 로고
    • A security enforcement kernel for OpenFlow networks
    • P. Porras et al., "A security enforcement kernel for OpenFlow networks," in Proc. of HotSDN, 2012.
    • (2012) Proc. of HotSDN
    • Porras, P.1
  • 9
    • 84883669303 scopus 로고    scopus 로고
    • VeriFlow: Verifying network-wide invariants in real time
    • A. Khurshid et al., "VeriFlow: verifying network-wide invariants in real time," in Proc. of HotSDN, 2012.
    • (2012) Proc. of HotSDN
    • Khurshid, A.1
  • 12
    • 70849136924 scopus 로고    scopus 로고
    • Threat modeling using attack trees
    • Apr.
    • V. Saini et al., "Threat modeling using attack trees," J. Comput. Sci. Coll., Apr. 2008.
    • (2008) J. Comput. Sci. Coll.
    • Saini, V.1
  • 13
    • 84872241240 scopus 로고    scopus 로고
    • "Open vSwitch," http://openvswitch.org/.
    • Open VSwitch
  • 14
    • 84896742579 scopus 로고    scopus 로고
    • NOXRepo.org
    • NOXRepo.org, "About POX," http://www.noxrepo.org/pox/about-pox/ .
    • About POX
  • 15
    • 84896764007 scopus 로고    scopus 로고
    • "Mininet," http://mininet.github.com/.
    • Mininet
  • 18
    • 84872001277 scopus 로고    scopus 로고
    • Reproducible network experiments using containerbased emulation
    • N. Handigol et al., "Reproducible network experiments using containerbased emulation," in Proc. of ACM CoNEXT, 2012.
    • (2012) Proc. of ACM CoNEXT
    • Handigol, N.1
  • 19
    • 84893799480 scopus 로고    scopus 로고
    • Carving research slices out of your production networks with OpenFlow
    • Jan.
    • R. Sherwood et al., "Carving research slices out of your production networks with OpenFlow," SIGCOMM CCR, Jan. 2010.
    • (2010) SIGCOMM CCR
    • Sherwood, R.1
  • 20
    • 85028098285 scopus 로고    scopus 로고
    • Parametric methods for anomaly detection in aggregate traffic
    • Apr.
    • G. Thatte et al., "Parametric methods for anomaly detection in aggregate traffic," IEEE/ACM Trans. Netw., Apr. 2011.
    • (2011) IEEE/ACM Trans. Netw.
    • Thatte, G.1
  • 21
    • 80052697992 scopus 로고    scopus 로고
    • DDoS attack detection method based on linear prediction model
    • J. Cheng et al., "DDoS attack detection method based on linear prediction model," in Proc. of ISIC, 2009.
    • (2009) Proc. of ISIC
    • Cheng, J.1
  • 22
    • 84893590740 scopus 로고    scopus 로고
    • Openflow random host mutation: Transparent moving target defense using software defined networking
    • J. H. Jafarian et al., "Openflow random host mutation: transparent moving target defense using software defined networking," in Proc. of HotSDN, 2012.
    • (2012) Proc. of HotSDN
    • Jafarian, J.H.1
  • 23
    • 79955041204 scopus 로고    scopus 로고
    • Lightweight DDoS flooding attack detection using NOX/OpenFlow
    • R. Braga et al., "Lightweight DDoS flooding attack detection using NOX/OpenFlow," in Proc. of IEEE LCN, 2010.
    • (2010) Proc. of IEEE LCN
    • Braga, R.1
  • 24


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.