메뉴 건너뛰기




Volumn , Issue , 2015, Pages 4-11

SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment

Author keywords

multi tenant datacenter; security and resilience

Indexed keywords

APPLICATION PROGRAMS; BANDWIDTH; COST ENGINEERING; FREQUENCY ALLOCATION; TELECOMMUNICATION TRAFFIC; TOPOLOGY;

EID: 84957679321     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN-W.2015.25     Document Type: Conference Paper
Times cited : (12)

References (57)
  • 1
    • 84886244808 scopus 로고    scopus 로고
    • "Openflow." [Online]. Available: http://www.openflow.org/wp/learnmore/
    • "Openflow." [Online]
  • 4
    • 84893525019 scopus 로고    scopus 로고
    • Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations
    • C.-J. Chung, J. Cui, P. Khatkar, and D. Huang, "Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations." ICST, 2013.
    • (2013) ICST
    • Chung, C.-J.1    Cui, J.2    Khatkar, P.3    Huang, D.4
  • 7
    • 84866695287 scopus 로고    scopus 로고
    • Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees
    • Boston, MA, USA, June 25-28, 2012
    • A. Roy, D. S. Kim, and K. S. Trivedi, "Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees," in IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012, 2012, pp. 1-12.
    • (2012) IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012 , pp. 1-12
    • Roy, A.1    Kim, D.S.2    Trivedi, K.S.3
  • 9
    • 85012186650 scopus 로고    scopus 로고
    • Finding hierarchical heavy hitters in data streams
    • Proceedings of the 29th International Conference on Very Large Data Bases - Volume 29, ser. Berlin, Germany: VLDB Endowment
    • G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava, "Finding hierarchical heavy hitters in data streams," in Proceedings of the 29th International Conference on Very Large Data Bases - Volume 29, ser. VLDB '03. Berlin, Germany: VLDB Endowment, 2003, p. 464475.
    • (2003) VLDB '03
    • Cormode, G.1    Korn, F.2    Muthukrishnan, S.3    Srivastava, D.4
  • 10
    • 84861919350 scopus 로고    scopus 로고
    • Detecting anomalies in backbone network traffic: A performance comparison among several change detection methods
    • Jan.
    • C. Callegari, S. Giordano, M. Pagano, and T. Pepe, "Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods," International Journal of Sensor Networks, vol. 11, no. 4, pp. 205-214, Jan. 2012.
    • (2012) International Journal of Sensor Networks , vol.11 , Issue.4 , pp. 205-214
    • Callegari, C.1    Giordano, S.2    Pagano, M.3    Pepe, T.4
  • 11
    • 84875951216 scopus 로고    scopus 로고
    • A methodological overview on anomaly detection
    • Data Traffic Monitoring and Analysis, ser. E. Biersack, C. Callegari, and M. Matijasevic, Eds. Springer Berlin Heidelberg, Jan. [Online]
    • C. Callegari, A. Coluccia, A. DAlconzo, W. Ellens, S. Giordano, M. Mandjes, M. Pagano, T. Pepe, F. Ricciato, and P. Zuraniewski, "A methodological overview on anomaly detection," in Data Traffic Monitoring and Analysis, ser. Lecture Notes in Computer Science, E. Biersack, C. Callegari, and M. Matijasevic, Eds. Springer Berlin Heidelberg, Jan. 2013, no. 7754, pp. 148-183. [Online]. Available: http://link.springer.com.ezproxy1.lib.asu.edu/chapter/10.1007/978-3-642-36784-7-7
    • (2013) Lecture Notes in Computer Science , Issue.7754 , pp. 148-183
    • Callegari, C.1    Coluccia, A.2    DAlconzo, A.3    Ellens, W.4    Giordano, S.5    Mandjes, M.6    Pagano, M.7    Pepe, T.8    Ricciato, F.9    Zuraniewski, P.10
  • 20
    • 0023997325 scopus 로고
    • Data diversity: An approach to software fault tolerance
    • P. E. Ammann and J. C. Knight, "Data diversity: An approach to software fault tolerance," Computers, IEEE Transactions on, vol. 37, no. 4, pp. 418-425, 1988.
    • (1988) Computers, IEEE Transactions on , vol.37 , Issue.4 , pp. 418-425
    • Ammann, P.E.1    Knight, J.C.2
  • 26
    • 84866521295 scopus 로고    scopus 로고
    • Openflow random host mutation: Transparent moving target defense using software defined networking
    • Proceedings of the first workshop on Hot topics in software defined networks, ser. New York, NY, USA: ACM
    • J. H. Jafarian, E. Al-Shaer, and Q. Duan, "Openflow random host mutation: transparent moving target defense using software defined networking," in Proceedings of the first workshop on Hot topics in software defined networks, ser. HotSDN '12. New York, NY, USA: ACM, 2012, pp. 127-132.
    • (2012) HotSDN '12 , pp. 127-132
    • Jafarian, J.H.1    Al-Shaer, E.2    Duan, Q.3
  • 27
    • 84866485994 scopus 로고    scopus 로고
    • Splendid isolation: A slice abstraction for software-defined networks
    • Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. New York, NY, USA: ACM
    • S. Gutz, A. Story, C. Schlesinger, and N. Foster, "Splendid isolation: A slice abstraction for software-defined networks," in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. HotSDN '12. New York, NY, USA: ACM, 2012, pp. 79-84.
    • (2012) HotSDN '12 , pp. 79-84
    • Gutz, S.1    Story, A.2    Schlesinger, C.3    Foster, N.4
  • 32
    • 84860544941 scopus 로고    scopus 로고
    • FireCol: A collaborative protection network for the detection of flooding DDoS attacks
    • J. Francois, I. Aib, and R. Boutaba, "FireCol: a collaborative protection network for the detection of flooding DDoS attacks," IEEE/ACM Transactions on Networking, vol. PP, no. 99, p. 1, 2012.
    • (2012) IEEE/ACM Transactions on Networking , vol.PP , Issue.99 , pp. 1
    • Francois, J.1    Aib, I.2    Boutaba, R.3
  • 33
    • 84902552655 scopus 로고    scopus 로고
    • "OpenStack Heat," available at https://wiki.openstack.org/wiki/Heat.
    • OpenStack Heat
  • 34
    • 84957709299 scopus 로고    scopus 로고
    • "OpenStack MAAS/JuJu," available at https://maas.ubuntu.com/docs/juju-quick-start.html.
    • OpenStack MAAS/JuJu
  • 35
    • 84957621379 scopus 로고    scopus 로고
    • "Puppet Software," available at http://puppetlabs.com/.
    • Puppet Software
  • 39
    • 24944486135 scopus 로고    scopus 로고
    • Network security management using ARP spoofing
    • Computational Science and Its Applications - ICCSA 2004, ser. Springer Berlin / Heidelberg
    • K. Kwon, S. Ahn, and J. Chung, "Network security management using ARP spoofing," in Computational Science and Its Applications - ICCSA 2004, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2004, vol. 3043, pp. 142-149.
    • (2004) Lecture Notes in Computer Science , vol.3043 , pp. 142-149
    • Kwon, K.1    Ahn, S.2    Chung, J.3
  • 40
    • 33947495454 scopus 로고    scopus 로고
    • Fighting bugs: Remove, retry, replicate, and rejuvenate
    • Feb.
    • M. Grottke and K. S. Trivedi, "Fighting bugs: Remove, retry, replicate, and rejuvenate," Computer, vol. 40, no. 2, pp. 107-109, Feb. 2007.
    • (2007) Computer , vol.40 , Issue.2 , pp. 107-109
    • Grottke, M.1    Trivedi, K.S.2
  • 42
    • 84883657030 scopus 로고    scopus 로고
    • How does testing affect the availability of aging software systems?
    • M. Grottke and B. Schleich, "How does testing affect the availability of aging software systems?" Perform. Eval., vol. 70, no. 3, pp. 179-196, 2013.
    • (2013) Perform. Eval. , vol.70 , Issue.3 , pp. 179-196
    • Grottke, M.1    Schleich, B.2
  • 43
    • 84885152176 scopus 로고    scopus 로고
    • A comprehensive approach to optimal software rejuvenation
    • J. Zhao, Y. Wang, G. Ning, K. S. Trivedi, R. M. Jr., and K. Cai, "A comprehensive approach to optimal software rejuvenation," Perform. Eval., vol. 70, no. 11, pp. 917-933, 2013.
    • (2013) Perform. Eval. , vol.70 , Issue.11 , pp. 917-933
    • Zhao, J.1    Wang, Y.2    Ning, G.3    Trivedi, K.S.4    M, R.5    Cai, K.6
  • 44
    • 84892614032 scopus 로고    scopus 로고
    • Software rejuvenation scheduling using accelerated life testing
    • J. Zhao, Y. Jin, K. S. Trivedi, R. M. Jr., and Y. Wang, "Software rejuvenation scheduling using accelerated life testing," JETC, vol. 10, no. 1, p. 9, 2014.
    • (2014) JETC , vol.10 , Issue.1 , pp. 9
    • Zhao, J.1    Jin, Y.2    Trivedi, K.S.3    M, R.4    Wang, Y.5
  • 52
    • 84883656370 scopus 로고    scopus 로고
    • A comparative experimental study of software rejuvenation overhead
    • J. Alonso, M. Rivalino, E. Vicente, A. Maria, and K. Trivedi, "A comparative experimental study of software rejuvenation overhead," Perform. Eval., vol. 70, no. 3, pp. 231-250, 2013.
    • (2013) Perform. Eval. , vol.70 , Issue.3 , pp. 231-250
    • Alonso, J.1    Rivalino, M.2    Vicente, E.3    Maria, A.4    Trivedi, K.5
  • 57
    • 84900451613 scopus 로고    scopus 로고
    • "Apache Spark," available at https://spark.apache.org/.
    • Apache Spark


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.