-
1
-
-
0020177868
-
Stored program controlled network
-
Sep.
-
S. Horing, J. Menard, and R. Staehler, "Stored program controlled network," Bell Syst. Tech. J., vol. 61, no. 7, pp. 1759-1778, Sep. 1982.
-
(1982)
Bell Syst. Tech. J.
, vol.61
, Issue.7
, pp. 1759-1778
-
-
Horing, S.1
Menard, J.2
Staehler, R.3
-
2
-
-
0001982732
-
A survey of active network research
-
Jan.
-
D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden, "A survey of active network research," IEEE Commun. Mag., vol. 35, no. 1, pp. 80-86, Jan. 1997.
-
(1997)
IEEE Commun. Mag.
, vol.35
, Issue.1
, pp. 80-86
-
-
Tennenhouse, D.L.1
Smith, J.M.2
Sincoskie, W.D.3
Wetherall, D.J.4
Minden, G.J.5
-
3
-
-
44249126961
-
SANE: A protection architecture for enterprise networks
-
M. Casado, et al., "SANE: A protection architecture for enterprise networks," in Proc. USENIX Security Symp., 2006, p. 10.
-
(2006)
Proc. USENIX Security Symp.
, pp. 10
-
-
Casado, M.1
-
4
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
Oct.
-
M. Casado, et al., "Ethane: Taking control of the enterprise," in ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 1-12, Oct. 2007.
-
(2007)
ACM SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.4
, pp. 1-12
-
-
Casado, M.1
-
5
-
-
84962372731
-
OpenFlow: Enabling innovation in campus networks
-
Apr.
-
N. McKeown, et al., "OpenFlow: Enabling innovation in campus networks," ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, Apr. 2008.
-
(2008)
ACM SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
-
6
-
-
84883290864
-
B4: Experience with a globally-deployed software defined WAN
-
S. Jain, et al., "B4: Experience with a globally-deployed software defined WAN," in Proc. ACM SIGCOMM Conf., 2013, pp. 3-14.
-
(2013)
Proc. ACM SIGCOMM Conf.
, pp. 3-14
-
-
Jain, S.1
-
7
-
-
84883284665
-
Ananta: Cloud scale load balancing
-
P. Patel, et al., "Ananta: Cloud scale load balancing," in Proc. ACM SIGCOMM Conf., 2013, pp. 207-218.
-
(2013)
Proc. ACM SIGCOMM Conf.
, pp. 207-218
-
-
Patel, P.1
-
8
-
-
84893718619
-
A software defined cloudgateway automation system using OpenFlow
-
Nov.
-
S. Natarajan, A. Ramaiah, and M. Mathen, "A software defined cloudgateway automation system using OpenFlow," in Proc. IEEE 2nd Int. Conf. CloudNet, Nov. 2013, pp. 219-226.
-
(2013)
Proc. IEEE 2nd Int. Conf. CloudNet
, pp. 219-226
-
-
Natarajan, S.1
Ramaiah, A.2
Mathen, M.3
-
9
-
-
84962424083
-
-
VMware, Inc., Palo Alto, CA, USA
-
VMware NSX Customer Story: Colt Decreases Data Center Networking Complexity, VMware, Inc., Palo Alto, CA, USA, 2014. [Online]. Available: http://blogs. vmware.com/networkvirtualization/2014/08/vmware-nsx-customer-story-colt-decreases-data-center-networkingcomplexity.html
-
(2014)
VMware NSX Customer Story: Colt Decreases Data Center Networking Complexity
-
-
-
11
-
-
70350656962
-
NOX: Towards an operating system for networks
-
Jul.
-
N. Gude, et al., "NOX: Towards an operating system for networks," ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 3, pp. 105-110, Jul. 2008.
-
(2008)
ACM SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
-
14
-
-
84962424520
-
-
OpenDaylight: A Linux Foundation Collaborative Project
-
OpenDaylight: A Linux Foundation Collaborative Project, 2014. Online]. Available: http://www.opendaylight.org
-
(2014)
-
-
-
15
-
-
84962458135
-
-
OpenContrail
-
OpenContrail. [Online]. Available: http://opencontrail.org/
-
-
-
-
16
-
-
84857207112
-
Onix: A distributed control platform for large-scale production networks
-
T. Koponen, et al., "Onix: A distributed control platform for large-scale production networks," in Proc. OSDI, 2010, vol. 10, pp. 1-6.
-
(2010)
Proc. OSDI
, vol.10
, pp. 1-6
-
-
Koponen, T.1
-
17
-
-
84893371881
-
SoftCell: Scalable and flexible cellular core network architecture
-
X. Jin, L. E. Li, L. Vanbever, and J. Rexford, "SoftCell: Scalable and flexible cellular core network architecture," in Proc. 9th ACM Conf. Emerging Netw. Exp. Technol., 2013, pp. 163-174.
-
(2013)
Proc. 9th ACM Conf. Emerging Netw. Exp. Technol.
, pp. 163-174
-
-
Jin, X.1
Li, L.E.2
Vanbever, L.3
Rexford, J.4
-
22
-
-
84903160009
-
Interfaces, attributes, and use cases: A compass for SDN
-
Jun.
-
M. Jarschel, T. Zinner, T. Hofeld, P. Tran-Gia, and W. Kellerer, "Interfaces, attributes, and use cases: A compass for SDN," IEEE Commun. Mag., vol. 52, no. 6, pp. 210-217, Jun. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.6
, pp. 210-217
-
-
Jarschel, M.1
Zinner, T.2
Hofeld, T.3
Tran-Gia, P.4
Kellerer, W.5
-
23
-
-
84962426414
-
-
ONF Specifications
-
ONF Specifications. [Online]. Available: https://www.opennetworking.org/sdn-resources/technical-library
-
-
-
-
24
-
-
84893626159
-
SDN security: A survey
-
S. Scott-Hayward, G. O'Callaghan, and S. Sezer, "SDN security: A survey," in Proc. IEEE SDN4FNS, 2013, pp. 1-7.
-
(2013)
Proc. IEEE SDN4FNS
, pp. 1-7
-
-
Scott-Hayward, S.1
O'Callaghan, G.2
Sezer, S.3
-
25
-
-
84896800526
-
-
M. S. thesis, Inst. Tech. Inf. Commun., Swiss Federal Inst. Technol. Zurich, Zurich, Switzerland, Apr.
-
R. Kloeti, "OpenFlow: A security analysis," M. S. thesis, Inst. Tech. Inf. Commun., Swiss Federal Inst. Technol. Zurich, Zurich, Switzerland, Apr. 2013. [Online]. Available: ftp://yosemite. ee. ethz. ch/pub/students/2012-HS/MA-2012-20-signed.pdf
-
(2013)
OpenFlow: A Security Analysis
-
-
Kloeti, R.1
-
26
-
-
84883734157
-
OpenFlow vulnerability assessment
-
K. Benton, L. J. Camp, and C. Small, "OpenFlow vulnerability assessment," in Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. Defined Netw., 2013, pp. 151-152.
-
(2013)
Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. Defined Netw.
, pp. 151-152
-
-
Benton, K.1
Camp, L.J.2
Small, C.3
-
27
-
-
84883671159
-
Towards secure and dependable software-defined networks
-
D. Kreutz, F. Ramos, and P. Verissimo, "Towards secure and dependable software-defined networks," in Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. Defined Netw., 2013, pp. 55-60.
-
(2013)
Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. Defined Netw.
, pp. 55-60
-
-
Kreutz, D.1
Ramos, F.2
Verissimo, P.3
-
28
-
-
84863164091
-
Evaluation of security vulnerabilities by using ProtoGENI as a launchpad
-
D. Li, X. Hong, and J. Bowman, "Evaluation of security vulnerabilities by using ProtoGENI as a launchpad," in Proc. IEEEGLOBECOM, 2011, pp. 1-6.
-
(2011)
Proc. IEEEGLOBECOM
, pp. 1-6
-
-
Li, D.1
Hong, X.2
Bowman, J.3
-
31
-
-
84922828146
-
Blessing or curse? Revisiting security aspects of software-defined networking
-
L. Schehlmann, S. Abt, and H. Baier, "Blessing or curse? Revisiting security aspects of software-defined networking," in Proc. 10th Int. CNSM, 2014, pp. 382-387.
-
(2014)
Proc. 10th Int. CNSM
, pp. 382-387
-
-
Schehlmann, L.1
Abt, S.2
Baier, H.3
-
33
-
-
84901399118
-
Software defined networking for security enhancement in wireless mobile networks
-
Jun.
-
A. Y. Ding, J. Crowcroft, S. Tarkoma, and H. Flinck, "Software defined networking for security enhancement in wireless mobile networks," Comput. Netw., vol. 66, pp. 94-101, Jun. 2014.
-
(2014)
Comput. Netw.
, vol.66
, pp. 94-101
-
-
Ding, A.Y.1
Crowcroft, J.2
Tarkoma, S.3
Flinck, H.4
-
34
-
-
84929904066
-
Cloud computing security: What changes with software-defined networking?
-
New York NY USA: Springer-Verlag
-
M. Tsugawa, A. Matsunaga, and J. A. Fortes, "Cloud computing security: What changes with software-defined networking?" in Secure Cloud Computing. New York, NY, USA: Springer-Verlag, 2014, pp. 77-93.
-
(2014)
Secure Cloud Computing
, pp. 77-93
-
-
Tsugawa, M.1
Matsunaga, A.2
Fortes, J.A.3
-
35
-
-
33847258361
-
Threat modelinguncover security design flaws using the stride approach
-
S. Hernan, S. Lambert, T. Ostwald, and A. Shostack, "Threat modelinguncover security design flaws using the stride approach," MSDN Magazine-Louisville, 2006, pp. 68-75.
-
(2006)
MSDN Magazine-Louisville
, pp. 68-75
-
-
Hernan, S.1
Lambert, S.2
Ostwald, T.3
Shostack, A.4
-
37
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds," in Proc. 16th ACM Conf. CCS, 2009, pp. 199-212.
-
(2009)
Proc. 16th ACM Conf. CCS
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
38
-
-
78149258537
-
FlowVisor: A network virtualization layer
-
Deutsche Telekom Inc. R&D Lab, Stanford, Nicira Networks, Tech. Rep.
-
R. Sherwood, et al., "FlowVisor: A network virtualization layer," Open-Flow Switch Consortium, Deutsche Telekom Inc. R&D Lab, Stanford, Nicira Networks, Tech. Rep., 2009.
-
(2009)
Open-Flow Switch Consortium
-
-
Sherwood, R.1
-
40
-
-
84962402161
-
-
OpenVirtex (OVX)
-
OpenVirtex (OVX) Network Hypervisor. [Online]. Available: www.openvirtex.org
-
Network Hypervisor
-
-
-
41
-
-
84875747956
-
Scalable network virtualization in software-defined networks
-
Mar. /Apr.
-
D. Drutskoy, E. Keller, and J. Rexford, "Scalable network virtualization in software-defined networks," IEEE Internet Comput., vol. 17, no. 2, pp. 20-27, Mar. /Apr. 2013.
-
(2013)
IEEE Internet Comput.
, vol.17
, Issue.2
, pp. 20-27
-
-
Drutskoy, D.1
Keller, E.2
Rexford, J.3
-
42
-
-
84962424516
-
-
SDN Dev Center: Unlock Network Innovation, Hewlett Packard Company, Palo Alto, CA, USA
-
SDN Dev Center: Unlock Network Innovation, Hewlett Packard Company, Palo Alto, CA, USA, 2014. [Online]. Available: www.hp. com/go/sdndevcenter
-
(2014)
-
-
-
43
-
-
84880545424
-
Are we ready for SDN? Implementation challenges for software-defined networks
-
Jul.
-
S. Sezer, et al., "Are we ready for SDN? Implementation challenges for software-defined networks," IEEE Commun. Mag., vol. 51, no. 7, pp. 36-43, Jul. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.7
, pp. 36-43
-
-
Sezer, S.1
-
44
-
-
84962424510
-
Securing distributed control of software defined networks
-
Sep.
-
M. M. O. Othman and K. Okamura, "Securing distributed control of software defined networks," Int. J. Comput. Sci. Netw. Security, vol. 13, no. 9, pp. 5-14, Sep. 2013.
-
(2013)
Int. J. Comput. Sci. Netw. Security
, vol.13
, Issue.9
, pp. 5-14
-
-
Othman, M.M.O.1
Okamura, K.2
-
45
-
-
84906997419
-
Byzantine-resilient secure softwaredefined networks with multiple controllers
-
H. Li, P. Li, S. Guo, and S. Yu, "Byzantine-resilient secure softwaredefined networks with multiple controllers," in Proc. IEEE ICC, 2014, pp. 695-700.
-
(2014)
Proc. IEEE ICC
, pp. 695-700
-
-
Li, H.1
Li, P.2
Guo, S.3
Yu, S.4
-
46
-
-
84893363124
-
Authentication for resilience: The case of SDN
-
Berlin, Germany: Springer-Verlag
-
D. Yu, A. W. Moore, C. Hall, and R. Anderson, "Authentication for resilience: The case of SDN," in ser. Security Protocols XXI. Berlin, Germany: Springer-Verlag, 2013, pp. 39-44.
-
(2013)
Ser. Security Protocols XXI
, pp. 39-44
-
-
Yu, D.1
Moore, A.W.2
Hall, C.3
Anderson, R.4
-
47
-
-
84883723129
-
Towards a secure controller platform for OpenFlow applications
-
X. Wen, Y. Chen, C. Hu, C. Shi, and Y. Wang, "Towards a secure controller platform for OpenFlow applications," in Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. Defined Netw., 2013, pp. 171-172.
-
(2013)
Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. Defined Netw.
, pp. 171-172
-
-
Wen, X.1
Chen, Y.2
Hu, C.3
Shi, C.4
Wang, Y.5
-
48
-
-
84919999193
-
OperationCheckpoint: SDN application control
-
S. Scott-Hayward, C. Kane, and S. Sezer, "OperationCheckpoint: SDN application control," in Proc. 22nd IEEE ICNP, 2014, pp. 618-623.
-
(2014)
Proc. 22nd IEEE ICNP
, pp. 618-623
-
-
Scott-Hayward, S.1
Kane, C.2
Sezer, S.3
-
50
-
-
85049403057
-
Securing the software-defined network control layer
-
San Diego, CA, USA, Feb.
-
P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, "Securing the software-defined network control layer," in Proc. NDSS, San Diego, CA, USA, Feb. 2015, pp. 1-15.
-
(2015)
Proc. NDSS
, pp. 1-15
-
-
Porras, P.1
Cheung, S.2
Fong, M.3
Skinner, K.4
Yegneswaran, V.5
-
51
-
-
84960464199
-
-
Univ. Federal Rio Janeiro, Rio de Janeiro, Brazil
-
D. M. F. Mattos, L. H. G. Ferraz, and O. C. M. B. Duarte, "AuthFlow: Authentication and access control mechanism for software defined networking," Univ. Federal Rio Janeiro, Rio de Janeiro, Brazil, 2014.
-
(2014)
AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking
-
-
Mattos, D.M.F.1
Ferraz, L.H.G.2
Duarte, O.C.M.B.3
-
53
-
-
84910659073
-
Rosemary: A robust, secure, and high-performance network operating system
-
S. Shin, et al., "Rosemary: A robust, secure, and high-performance network operating system," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2014, pp. 78-89.
-
(2014)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 78-89
-
-
Shin, S.1
-
55
-
-
84889062725
-
AVANT-GUARD: Scalable and vigilant switch flow management in software-defined networks
-
S. Shin, V. Yegneswaran, P. Porras, and G. Gu, "AVANT-GUARD: Scalable and vigilant switch flow management in software-defined networks," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2013, pp. 413-424.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 413-424
-
-
Shin, S.1
Yegneswaran, V.2
Porras, P.3
Gu, G.4
-
56
-
-
84864245314
-
A replication component for resilient OpenFlow-based networking
-
P. Fonseca, R. Bennesby, E. Mota, and A. Passito, "A replication component for resilient OpenFlow-based networking," in Proc. IEEE NOMS, 2012, pp. 933-939.
-
(2012)
Proc. IEEE NOMS
, pp. 933-939
-
-
Fonseca, P.1
Bennesby, R.2
Mota, E.3
Passito, A.4
-
57
-
-
84055179019
-
Source address validation solution with Open Flow/NOXarchitecture
-
G. Yao, J. Bi, and P. Xiao, "Source address validation solution with OpenFlow/NOXarchitecture,"inProc. 19thIEEEICNP, 2011, pp. 7-12.
-
(2011)
Proc. 19th IEEE ICNP
, pp. 7-12
-
-
Yao, G.1
Bi, J.2
Xiao, P.3
-
58
-
-
77954334703
-
Delegating network security with more information
-
J. Naous, R. Stutsman, D. Mazieres, N. McKeown, and N. Zeldovich, "Delegating network security with more information," in Proc. 1st ACM Workshop Res. Enterprise Netw., 2009, pp. 19-26.
-
(2009)
Proc. 1st ACM Workshop Res. Enterprise Netw.
, pp. 19-26
-
-
Naous, J.1
Stutsman, R.2
Mazieres, D.3
McKeown, N.4
Zeldovich, N.5
-
59
-
-
85013634872
-
A NICE way to test OpenFlow applications
-
M. Canini, D. Venzano, P. Peresini, D. Kostic, and J. Rexford, "A NICE way to test OpenFlow applications," in Proc. 9th USENIX Conf. Netw. Syst. Des. Implementation, 2012, p. 10.
-
(2012)
Proc. 9th USENIX Conf. Netw. Syst. Des. Implementation
, pp. 10
-
-
Canini, M.1
Venzano, D.2
Peresini, P.3
Kostic, D.4
Rexford, J.5
-
60
-
-
78650109005
-
FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures
-
E. Al-Shaer and S. Al-Haj, "FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures," in Proc. 3rd ACM Workshop Assurable Usable Security Config., 2010, pp. 37-44.
-
(2010)
Proc. 3rd ACM Workshop Assurable Usable Security Config.
, pp. 37-44
-
-
Al-Shaer, E.1
Al-Haj, S.2
-
61
-
-
84891358075
-
Model checking invariant security properties in OpenFlow
-
S. Son, S. Shin, V. Yegneswaran, P. Porras, and G. Gu, "Model checking invariant security properties in OpenFlow," Proc. IEEE Int. Conf. Commun., 2013, pp. 1974-1979. [Online]. Available: http://faculty.cse.tamu.edu/guofei/paper/Flover-ICC13.pdf
-
(2013)
Proc. IEEE Int. Conf. Commun.
, pp. 1974-1979
-
-
Son, S.1
Shin, S.2
Yegneswaran, V.3
Porras, P.4
Gu, G.5
-
62
-
-
80053150074
-
Debugging the data plane with anteater
-
Aug.
-
H. Mai, et al., "Debugging the data plane with anteater," ACM SIGCOMM Comput. Commun. Rev., vol. 41, no. 4, pp. 290-301, Aug. 2011.
-
(2011)
ACM SIGCOMM Comput. Commun. Rev.
, vol.41
, Issue.4
, pp. 290-301
-
-
Mai, H.1
-
63
-
-
84893267876
-
VeriFlow: Verifying network-wide invariants in real time
-
Oct.
-
A. Khurshid, W. Zhou, M. Caesar, and P. Godfrey, "VeriFlow: Verifying network-wide invariants in real time," ACM SIGCOMM Comput. Commun. Rev., vol. 42, no. 4, pp. 467-472, Oct. 2012.
-
(2012)
ACM SIGCOMM Comput. Commun. Rev.
, vol.42
, Issue.4
, pp. 467-472
-
-
Khurshid, A.1
Zhou, W.2
Caesar, M.3
Godfrey, P.4
-
64
-
-
85076709056
-
Real time network policy checking using header space analysis
-
P. Kazemian, et al., "Real time network policy checking using header space analysis," in Proc. USENIX Symp. NSDI, 2013, pp. 99-112.
-
(2013)
Proc. USENIX Symp. NSDI
, pp. 99-112
-
-
Kazemian, P.1
-
66
-
-
85094658658
-
Towards a reliable SDN firewall
-
Santa Clara, CA, USA
-
H. Hu, G.-J. Ahn, W. Han, and Z. Zhao, "Towards a reliable SDN firewall," presented at the Open Networking Summit, Santa Clara, CA, USA, 2014.
-
(2014)
Open Networking Summit
-
-
Hu, H.1
Ahn, G.-J.2
Han, W.3
Zhao, Z.4
-
67
-
-
84907014880
-
FLOWGUARD: Building robust firewalls for software-defined networks
-
H. Hu, W. Han, G.-J. Ahn, and Z. Zhao, "FLOWGUARD: Building robust firewalls for software-defined networks," in Proc. 3rd Workshop Hot Topics Softw. Defined Netw., 2014, pp. 97-102.
-
(2014)
Proc. 3rd Workshop Hot Topics Softw. Defined Netw.
, pp. 97-102
-
-
Hu, H.1
Han, W.2
Ahn, G.-J.3
Zhao, Z.4
-
68
-
-
84958529476
-
LPM: Layered policy management for software-defined networks
-
Berlin, Germany: Springer-Verlag
-
W. Han, H. Hu, and G.-J. Ahn, "LPM: Layered policy management for software-defined networks," Data and Applications Security and Privacy XXVIII. Berlin, Germany: Springer-Verlag, 2014, pp. 356-363.
-
(2014)
Data and Applications Security and Privacy XXVIII
, pp. 356-363
-
-
Han, W.1
Hu, H.2
Ahn, G.-J.3
-
69
-
-
80053341773
-
Frenetic: A network programming language
-
Sep.
-
N. Foster, et al., "Frenetic: A network programming language," ACM SIGPLAN Notices, vol. 46, no. 9, pp. 279-291, Sep. 2011.
-
(2011)
ACM SIGPLAN Notices
, vol.46
, Issue.9
, pp. 279-291
-
-
Foster, N.1
-
70
-
-
77954330731
-
-
Univ. Chicago, Chicago, IL, USA, Tech. Rep.
-
T. Hinrichs, N. Gude, M. Casado, J. Mitchell, and S. Shenker, "Expressing and enforcing flow-based network security policies," Univ. Chicago, Chicago, IL, USA, Tech. Rep., 2008.
-
(2008)
Expressing and Enforcing Flow-based Network Security Policies
-
-
Hinrichs, T.1
Gude, N.2
Casado, M.3
Mitchell, J.4
Shenker, S.5
-
71
-
-
83455163873
-
Consistent updates for software-defined networks: Change you can believe
-
M. Reitblatt, N. Foster, J. Rexford, and D. Walker, "Consistent updates for software-defined networks: Change you can believe in!" in Proc. 10th ACM Workshop Hot Topics Netw., 2011, p. 7.
-
(2011)
Proc. 10th ACM Workshop Hot Topics Netw.
, pp. 7
-
-
Reitblatt, M.1
Foster, N.2
Rexford, J.3
Walker, D.4
-
72
-
-
84893515786
-
On the feasibility of a consistent and fault-tolerant data store for SDNs
-
F. A. Botelho, F. M. V. Ramos, D. Kreutz, and A. N. Bessani, "On the feasibility of a consistent and fault-tolerant data store for SDNs," in Proc. 2nd EWSDN, 2013, pp. 38-43.
-
(2013)
Proc. 2nd EWSDN
, pp. 38-43
-
-
Botelho, F.A.1
Ramos, F.M.V.2
Kreutz, D.3
Bessani, A.N.4
-
73
-
-
84866485994
-
Splendid isolation: Language-based security for software-defined networks
-
C. Schlesinger, A. Story, S. Gutz, N. Foster, and D. Walker, "Splendid isolation: Language-based security for software-defined networks," in Proc. 1stWorkshop Hot Topics Softw. Defined Netw., 2012, pp. 79-84.
-
(2012)
Proc. 1stWorkshop Hot Topics Softw. Defined Netw.
, pp. 79-84
-
-
Schlesinger, C.1
Story, A.2
Gutz, S.3
Foster, N.4
Walker, D.5
-
74
-
-
84877624157
-
Verifiably-safe software-defined networks for CPS
-
R. W. Skowyra, A. Lapets, A. Bestavros, and A. Kfoury, "Verifiably-safe software-defined networks for CPS," in Proc. 2nd ACM Int. Conf. High Confidence Netw. Syst., 2013, pp. 101-110.
-
(2013)
Proc. 2nd ACM Int. Conf. High Confidence Netw. Syst.
, pp. 101-110
-
-
Skowyra, R.W.1
Lapets, A.2
Bestavros, A.3
Kfoury, A.4
-
75
-
-
84880119818
-
Machine-verified network controllers
-
Jun.
-
A. Guha, M. Reitblatt, and N. Foster, "Machine-verified network controllers," ACM SIGPLAN Notices, vol. 48, no. 6, pp. 483-494, Jun. 2013.
-
(2013)
ACM SIGPLAN Notices
, vol.48
, Issue.6
, pp. 483-494
-
-
Guha, A.1
Reitblatt, M.2
Foster, N.3
-
77
-
-
84866494980
-
Where is the debugger for my software-defined network?
-
N. Handigol, B. Heller, V. Jeyakumar, D. Mazieres, and N. McKeown, "Where is the debugger for my software-defined network?" in Proc. 1st Workshop Hot Topics Softw. Defined Netw., 2012, pp. 55-60.
-
(2012)
Proc. 1st Workshop Hot Topics Softw. Defined Netw.
, pp. 55-60
-
-
Handigol, N.1
Heller, B.2
Jeyakumar, V.3
Mazieres, D.4
McKeown, N.5
-
78
-
-
84893589427
-
Enabling secure mobility with OpenFlow
-
S. Namal, I. Ahmad, A. Gurtov, and M. Ylianttila, "Enabling secure mobility with OpenFlow," in Proc. IEEE Softw. Defined Netw. Future Netw. Serv., 2013, pp. 1-5.
-
(2013)
Proc. IEEE Softw. Defined Netw. Future Netw. Serv.
, pp. 1-5
-
-
Namal, S.1
Ahmad, I.2
Gurtov, A.3
Ylianttila, M.4
-
79
-
-
84908884335
-
Securing the control channel of software-defined mobile networks
-
M. Liyanage, M. Ylianttila, and A. Gurtov, "Securing the control channel of software-defined mobile networks," in Proc. IEEE 15th Int. Symp. World Wireless, Mobile Multimedia Netw., 2014, pp. 1-6.
-
(2014)
Proc. IEEE 15th Int. Symp. World Wireless, Mobile Multimedia Netw.
, pp. 1-6
-
-
Liyanage, M.1
Ylianttila, M.2
Gurtov, A.3
-
80
-
-
84893365261
-
FRESCO: Modular composable security services for software-defined networks
-
San Diego, CA, USA
-
S. Shin, et al., "FRESCO: Modular composable security services for software-defined networks," in Proc. Netw. Distrib. Security Symp., San Diego, CA, USA, 2013, pp. 1-16.
-
(2013)
Proc. Netw. Distrib. Security Symp.
, pp. 1-16
-
-
Shin, S.1
-
81
-
-
84893479530
-
Extending SDN to large-scale networks
-
J. McCauley, A. Panda, M. Casado, T. Koponen, and S. Shenker, "Extending SDN to large-scale networks," in Proc. Open Netw. Summit, pp. 1-2, 2013.
-
(2013)
Proc. Open Netw. Summit
, pp. 1-2
-
-
McCauley, J.1
Panda, A.2
Casado, M.3
Koponen, T.4
Shenker, S.5
-
82
-
-
84966332941
-
Design and deployment of secure, robust and resilient SDN controllers
-
S. Scott-Hayward, "Design and deployment of secure, robust and resilient SDN controllers," in Proc. IEEE Conf. NetSoft, 2015, pp. 1-5.
-
(2015)
Proc. IEEE Conf. NetSoft
, pp. 1-5
-
-
Scott-Hayward, S.1
-
83
-
-
84921064074
-
On the design of practical fault-tolerant SDN controllers
-
F. Botelho, A. Bessani, F. M. Ramos, and P. Ferreira, "On the design of practical fault-tolerant SDN controllers," in Proc. 3rd EWSDN, 2014, pp. 73-78.
-
(2014)
Proc. 3rd EWSDN
, pp. 73-78
-
-
Botelho, F.1
Bessani, A.2
Ramos, F.M.3
Ferreira, P.4
-
84
-
-
85074798835
-
Header space analysis: Static checking for networks
-
P. Kazemian, G. Varghese, and N. McKeown, "Header space analysis: Static checking for networks," in Proc. NSDI, 2012, pp. 113-126.
-
(2012)
Proc. NSDI
, pp. 113-126
-
-
Kazemian, P.1
Varghese, G.2
McKeown, N.3
-
85
-
-
84866490861
-
Abstractions for network update
-
M. Reitblatt, N. Foster, J. Rexford, C. Schlesinger, and D. Walker, "Abstractions for network update," in Proc. ACM SIGCOMM Conf. Appl., Technol., Architect., Protocols Comput. Commun., 2012, pp. 323-334.
-
(2012)
Proc. ACM SIGCOMM Conf. Appl., Technol., Architect., Protocols Comput. Commun.
, pp. 323-334
-
-
Reitblatt, M.1
Foster, N.2
Rexford, J.3
Schlesinger, C.4
Walker, D.5
-
86
-
-
84859924359
-
Efficient conflict detection in flowbased virtualized networks
-
Jan.
-
S. Natarajan, X. Huang, and T. Wolf, "Efficient conflict detection in flowbased virtualized networks," in Proc. ICNC, Jan. 2012, pp. 690-696.
-
(2012)
Proc. ICNC
, pp. 690-696
-
-
Natarajan, S.1
Huang, X.2
Wolf, T.3
-
87
-
-
67649883905
-
Host identity protocol
-
Apr.
-
R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson, "Host identity protocol," RFC5201, Apr. 2008.
-
(2008)
RFC5201
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.4
-
88
-
-
84897109717
-
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
-
Apr.
-
K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments," Comput. Netw., vol 62, pp. 122-136, Apr. 2013.
-
(2013)
Comput. Netw.
, vol.62
, pp. 122-136
-
-
Giotis, K.1
Argyropoulos, C.2
Androulidakis, G.3
Kalogeras, D.4
Maglaris, V.5
-
89
-
-
84893266021
-
Active security
-
R. Hand, M. Ton, and E. Keller, "Active security," in Proc. ACM SIGCOMM Hot Topics Netw., 2013, p. 17.
-
(2013)
Proc. ACM SIGCOMM Hot Topics Netw.
, pp. 17
-
-
Hand, R.1
Ton, M.2
Keller, E.3
-
90
-
-
84893598320
-
-
Boston Univ. Boston, MA, USA
-
R. Skowyra, S. Bahargam, and A. Bestavros, "Software-defined IDS for securing embedded mobile devices," Boston Univ. Boston, MA, USA, 2013. [Online]. Available: http://www.cs.bu.edu/techreports/pdf/2013-005-software-defined-ids.pdf
-
(2013)
Software-defined IDS for Securing Embedded Mobile Devices
-
-
Skowyra, R.1
Bahargam, S.2
Bestavros, A.3
-
91
-
-
84891361284
-
NetFuse: Short-circuiting traffic surges in the cloud
-
Y. Wang, Y. Zhang, V. Singh, C. Lumezanu, and G. Jiang, "NetFuse: Short-circuiting traffic surges in the cloud," in Proc. IEEE ICC, 2013, pp. 3514-3518.
-
(2013)
Proc. IEEE ICC
, pp. 3514-3518
-
-
Wang, Y.1
Zhang, Y.2
Singh, V.3
Lumezanu, C.4
Jiang, G.5
-
92
-
-
84904165732
-
OrchSec: An orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions
-
A. Zaalouk, R. Khondoker, R. Marx, and K. Bayarou, "OrchSec: An orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions," in Proc. IEEE NOMS, 2014, pp. 1-9.
-
(2014)
Proc. IEEE NOMS
, pp. 1-9
-
-
Zaalouk, A.1
Khondoker, R.2
Marx, R.3
Bayarou, K.4
-
93
-
-
84927513249
-
Cognition: A tool for reinforcing security in software defined networks
-
V. Basel, Switzerland: Springer-Verlag
-
E. Tantar, M. R. Palattella, T. Avanesov, M. Kantor, and T. Engel, "Cognition: A tool for reinforcing security in software defined networks," EVOLVE-A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V. Basel, Switzerland: Springer-Verlag, 2014, pp. 61-78.
-
(2014)
EVOLVE-A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation
, pp. 61-78
-
-
Tantar, E.1
Palattella, M.R.2
Avanesov, T.3
Kantor, M.4
Engel, T.5
-
94
-
-
77954339615
-
Resonance: Dynamic access control for enterprise networks
-
A. K. Nayak, A. Reimers, N. Feamster, and R. Clark, "Resonance: Dynamic access control for enterprise networks," in Proc. 1st ACM Workshop Res. Enterprise Netw., 2009, pp. 11-18.
-
(2009)
Proc. 1st ACM Workshop Res. Enterprise Netw.
, pp. 11-18
-
-
Nayak, A.K.1
Reimers, A.2
Feamster, N.3
Clark, R.4
-
95
-
-
84962438754
-
Securing enterprise networks using traffic tainting
-
A. Ramachandran, Y. Mundada, M. B. Tariq, and N. Feamster, "Securing enterprise networks using traffic tainting," in Proc. SIGCOMM, 2009, pp. 1-2.
-
(2009)
Proc. SIGCOMM
, pp. 1-2
-
-
Ramachandran, A.1
Mundada, Y.2
Tariq, M.B.3
Feamster, N.4
-
96
-
-
84866521295
-
OpenFlow random host mutation: Transparent moving target defense using software defined networking
-
J. H. Jafarian, E. Al-Shaer, and Q. Duan, "OpenFlow random host mutation: Transparent moving target defense using software defined networking," in Proc. 1st Workshop Hot Topics Softw. Defined Netw., 2012, pp. 127-132.
-
(2012)
Proc. 1st Workshop Hot Topics Softw. Defined Netw.
, pp. 127-132
-
-
Jafarian, J.H.1
Al-Shaer, E.2
Duan, Q.3
-
97
-
-
84908887667
-
SDN-based solutions for moving target defense network protection
-
P. Kampanakis, H. Perros, and T. Beyene, "SDN-based solutions for moving target defense network protection," in Proc. IEEE 15th Int. Symp. WoWMoM Netw., 2014, pp. 1-6.
-
(2014)
Proc. IEEE 15th Int. Symp. WoWMoM Netw.
, pp. 1-6
-
-
Kampanakis, P.1
Perros, H.2
Beyene, T.3
-
98
-
-
84897585209
-
NICE: Network intrusion detection and countermeasure selection in virtual network systems
-
Jul. /Aug.
-
C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, "NICE: Network intrusion detection and countermeasure selection in virtual network systems," IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 198-211, Jul. /Aug. 2013.
-
(2013)
IEEE Trans. Dependable Secure Comput.
, vol.10
, Issue.4
, pp. 198-211
-
-
Chung, C.-J.1
Khatkar, P.2
Xing, T.3
Lee, J.4
Huang, D.5
-
99
-
-
84885205587
-
SnortFlow: A OpenFlow-based intrusion prevention system in cloud environment
-
T. Xing, D. Huang, L. Xu, C.-J. Chung, and P. Khatkar, "SnortFlow: A OpenFlow-based intrusion prevention system in cloud environment," in Proc. 2nd GENI GREE Workshop, 2013, pp. 89-92.
-
(2013)
Proc. 2nd GENI GREE Workshop
, pp. 89-92
-
-
Xing, T.1
Huang, D.2
Xu, L.3
Chung, C.-J.4
Khatkar, P.5
-
100
-
-
84922792143
-
SDNIPS: Enabling software-defined networking based intrusion prevention system in clouds
-
T. Xing, Z. Xiong, D. Huang, and D. Medhi, "SDNIPS: Enabling software-defined networking based intrusion prevention system in clouds," in Proc. 10th Int. Conf. Netw. Serv. Manage., 2014, pp. 308-311.
-
(2014)
Proc. 10th Int. Conf. Netw. Serv. Manage.
, pp. 308-311
-
-
Xing, T.1
Xiong, Z.2
Huang, D.3
Medhi, D.4
-
101
-
-
84925851831
-
Scalable network intrusion detection on virtual SDN environment
-
C. Jeong, T. Ha, J. Narantuya, H. Lim, and J. Kim, "Scalable network intrusion detection on virtual SDN environment," in Proc. IEEE 3rd Int. Conf. CloudNet, 2014, pp. 264-265.
-
(2014)
Proc. IEEE 3rd Int. Conf. CloudNet
, pp. 264-265
-
-
Jeong, C.1
Ha, T.2
Narantuya, J.3
Lim, H.4
Kim, J.5
-
102
-
-
84857255431
-
Revisiting traffic anomaly detection using software defined networking
-
Berlin, Germany: Springer-Verlag
-
S. A. Mehdi, J. Khalid, and S. A. Khayam, "Revisiting traffic anomaly detection using software defined networking," in Recent Advances in Intrusion Detection. Berlin, Germany: Springer-Verlag, 2011, pp. 161-180.
-
(2011)
Recent Advances in Intrusion Detection
, pp. 161-180
-
-
Mehdi, S.A.1
Khalid, J.2
Khayam, S.A.3
-
103
-
-
84898984732
-
A fuzzy logic-based information security management for software-defined networks
-
S. Dotcenko, A. Vladyko, and I. Letenko, "A fuzzy logic-based information security management for software-defined networks," in Proc. 16th ICACT, 2014, pp. 167-171.
-
(2014)
Proc. 16th ICACT
, pp. 167-171
-
-
Dotcenko, S.1
Vladyko, A.2
Letenko, I.3
-
104
-
-
79955041204
-
Lightweight DDoS flooding attack detection using NOX/OpenFlow
-
R. Braga, E. Mota, and A. Passito, "Lightweight DDoS flooding attack detection using NOX/OpenFlow," in Proc. IEEE 35th Conf. LCN, 2010, pp. 408-415.
-
(2010)
Proc. IEEE 35th Conf. LCN
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
105
-
-
84962402837
-
Implementation of content-oriented networking architecture (CONA): A focus on DDoS countermeasure
-
Cambridge, U. K.
-
J. Suh, et al., "Implementation of content-oriented networking architecture (CONA): A focus on DDoS countermeasure," in Proc. European NetFPGA Developers Workshop, Cambridge, U. K., 2010, pp. 1-6.
-
(2010)
Proc. European NetFPGA Developers Workshop
, pp. 1-6
-
-
Suh, J.1
-
106
-
-
79951760230
-
A novel design for future on-demand service and security
-
Y. H. Chu, M. C. Tseng, Y. T. Chen, Y. C. Chou, and Y. R. Chen, "A novel design for future on-demand service and security," in Proc. IEEE 12th ICCT, 2010, pp. 385-388.
-
(2010)
Proc. IEEE 12th ICCT
, pp. 385-388
-
-
Chu, Y.H.1
Tseng, M.C.2
Chen, Y.T.3
Chou, Y.C.4
Chen, Y.R.5
-
107
-
-
84906715175
-
A SDN-oriented DDoS blocking scheme for botnet-based attacks
-
S. Lim, J. Ha, H. Kim, Y. Kim, and S. Yang, "A SDN-oriented DDoS blocking scheme for botnet-based attacks," in Proc. 6th ICUFN, 2014, pp. 63-68.
-
(2014)
Proc. 6th ICUFN
, pp. 63-68
-
-
Lim, S.1
Ha, J.2
Kim, H.3
Kim, Y.4
Yang, S.5
-
108
-
-
84883735924
-
A slick control plane for network middleboxes
-
B. Anwer, T. Benson, N. Feamster, D. Levin, and J. Rexford, "A slick control plane for network middleboxes," in Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. Defined Netw., 2013, pp. 147-148.
-
(2013)
Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. Defined Netw.
, pp. 147-148
-
-
Anwer, B.1
Benson, T.2
Feamster, N.3
Levin, D.4
Rexford, J.5
-
109
-
-
85071935677
-
Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags
-
S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul, "Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags," in Proc. NSDI, 2014, pp. 533-546.
-
(2014)
Proc. NSDI
, pp. 533-546
-
-
Fayazbakhsh, S.K.1
Chiang, L.2
Sekar, V.3
Yu, M.4
Mogul, J.C.5
-
110
-
-
84883284152
-
SIMPLE-fying middlebox policy enforcement using SDN
-
Aug.
-
Z. A. Qazi, et al., "SIMPLE-fying middlebox policy enforcement using SDN," in Proc. ACM SIGCOMM, Aug. 2013, pp. 27-38.
-
(2013)
Proc. ACM SIGCOMM
, pp. 27-38
-
-
Qazi, Z.A.1
-
111
-
-
84962455251
-
Dynamic security traversal in OpenFlow networks with QoS guarantee
-
Y.-J. Chen, F.-Y. Lin, and L.-C. Wang, "Dynamic security traversal in OpenFlow networks with QoS guarantee," Int. J. Sci. Eng., vol. 4, no. 2, pp. 251-256, 2014.
-
(2014)
Int. J. Sci. Eng.
, vol.4
, Issue.2
, pp. 251-256
-
-
Chen, Y.-J.1
Lin, F.-Y.2
Wang, L.-C.3
-
112
-
-
80053147599
-
Design of the multi-level security network switch system which restricts covert channel
-
X. Liu, H. Xue, X. Feng, and Y. Dai, "Design of the multi-level security network switch system which restricts covert channel," in Proc. IEEE 3rd ICCSN, 2011, pp. 233-237.
-
(2011)
Proc. IEEE 3rd ICCSN
, pp. 233-237
-
-
Liu, X.1
Xue, H.2
Feng, X.3
Dai, Y.4
-
113
-
-
85043718049
-
Extensible and scalable network monitoring using OpenSAFE
-
J. R. Ballard, I. Rae, and A. Akella, "Extensible and scalable network monitoring using OpenSAFE," Proc. INM/WREN, 2010, p. 8.
-
(2010)
Proc. INM/WREN
, pp. 8
-
-
Ballard, J.R.1
Rae, I.2
Akella, A.3
-
114
-
-
84874562245
-
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
-
S. Shin and G. Gu, "CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)," in Proc. 20th IEEE ICNP, 2012, pp. 1-6.
-
(2012)
Proc. 20th IEEE ICNP
, pp. 1-6
-
-
Shin, S.1
Gu, G.2
-
115
-
-
84928631572
-
Development of a secure traffic analysis system to trace malicious activities on internal networks
-
S. Hirono, Y. Yamaguchi, H. Shimada, and H. Takakura, "Development of a secure traffic analysis system to trace malicious activities on internal networks," in Proc. IEEE 38th Annu. COMPSAC Conf., 2014, pp. 305-310.
-
(2014)
Proc. IEEE 38th Annu. COMPSAC Conf.
, pp. 305-310
-
-
Hirono, S.1
Yamaguchi, Y.2
Shimada, H.3
Takakura, H.4
-
116
-
-
84928231853
-
Let SDN be your eyes: Secure forensics in data center networks
-
A. Bates, K. Butler, A. Haeberlen, M. Sherr, and W. Zhou, "Let SDN be your eyes: Secure forensics in data center networks," in Proc. Workshop SENT, 2014, pp. 1-7.
-
(2014)
Proc. Workshop SENT
, pp. 1-7
-
-
Bates, A.1
Butler, K.2
Haeberlen, A.3
Sherr, M.4
Zhou, W.5
-
117
-
-
84934963911
-
SDN-driven authentication and access control system
-
V. Dangovas and F. Kuliesius, "SDN-driven authentication and access control system," in Proc. Int. Conf. DINWC, 2014, pp. 20-23.
-
(2014)
Proc. Int. Conf. DINWC
, pp. 20-23
-
-
Dangovas, V.1
Kuliesius, F.2
-
118
-
-
84921056905
-
C-BAS: Certificate-based AAA for SDN experimental facilities
-
U. Toseef, A. Zaalouk, T. Rothe, M. Broadbent, and K. Pentikousis, "C-BAS: Certificate-based AAA for SDN experimental facilities," in Proc. 3rd EWSDN, 2014, pp. 91-96.
-
(2014)
Proc. 3rd EWSDN
, pp. 91-96
-
-
Toseef, U.1
Zaalouk, A.2
Rothe, T.3
Broadbent, M.4
Pentikousis, K.5
-
119
-
-
84900614780
-
Collaborative network security in multi-tenant data center for cloud computing
-
Feb.
-
Z. Chen, et al., "Collaborative network security in multi-tenant data center for cloud computing," Tsinghua Sci. Technol., vol. 19, no. 1, pp. 82-94, Feb. 2014.
-
(2014)
Tsinghua Sci. Technol.
, vol.19
, Issue.1
, pp. 82-94
-
-
Chen, Z.1
-
120
-
-
84908592944
-
A softwaredefined scalable and autonomous architecture for multi-tenancy
-
M. F. Ahmed, C. Talhi, M. Pourzandi, and M. Cheriet, "A softwaredefined scalable and autonomous architecture for multi-tenancy," in Proc. IEEE IC2E, 2014, pp. 568-573.
-
(2014)
Proc. IEEE IC2E
, pp. 568-573
-
-
Ahmed, M.F.1
Talhi, C.2
Pourzandi, M.3
Cheriet, M.4
-
121
-
-
84908200467
-
Tualatin: Towards network security service provision in cloud datacenters
-
X. Wang, Z. Liu, J. Li, B. Yang, and Y. Qi, "Tualatin: Towards network security service provision in cloud datacenters," in Proc. 23rd ICCCN, 2014, pp. 1-8.
-
(2014)
Proc. 23rd ICCCN
, pp. 1-8
-
-
Wang, X.1
Liu, Z.2
Li, J.3
Yang, B.4
Qi, Y.5
-
124
-
-
84893368816
-
An adaptive flow counting method for anomaly detection in SDN
-
Y. Zhang, "An adaptive flow counting method for anomaly detection in SDN," in Proc. 9th ACM Conf. Emerging Netw. Exp. Technol., 2013, pp. 25-30.
-
(2013)
Proc. 9th ACM Conf. Emerging Netw. Exp. Technol.
, pp. 25-30
-
-
Zhang, Y.1
-
125
-
-
84889067635
-
Efficient implementation of security applications in OpenFlow controller with FleXam
-
S. Shirali-Shahreza and Y. Ganjali, "Efficient implementation of security applications in OpenFlow controller with FleXam," in Proc. IEEE 21st Annu. Symp. HOTI, 2013, pp. 49-54.
-
(2013)
Proc. IEEE 21st Annu. Symp. HOTI
, pp. 49-54
-
-
Shirali-Shahreza, S.1
Ganjali, Y.2
-
126
-
-
85076681695
-
Software defined traffic measurement with OpenSketch
-
M. Yu, L. Jose, and R. Miao, "Software defined traffic measurement with OpenSketch," in Proc. 10th USENIX Symp. NSDI, 2013, pp. 29-42.
-
(2013)
Proc. 10th USENIX Symp. NSDI
, pp. 29-42
-
-
Yu, M.1
Jose, L.2
Miao, R.3
-
127
-
-
84889710187
-
Online measurement of large traffic aggregates on commodity switches
-
L. Jose, M. Yu, and J. Rexford, "Online measurement of large traffic aggregates on commodity switches," in Proc. USENIX HotICE Workshop, 2011, p. 13.
-
(2011)
Proc. USENIX HotICE Workshop
, pp. 13
-
-
Jose, L.1
Yu, M.2
Rexford, J.3
-
128
-
-
84898022001
-
Virtualized network isolation using software defined networks
-
R. V. Nunes, R. L. Pontes, and D. Guedes, "Virtualized network isolation using software defined networks," in Proc. IEEE 38th Conf. LCN, 2013, pp. 683-686.
-
(2013)
Proc. IEEE 38th Conf. LCN
, pp. 683-686
-
-
Nunes, R.V.1
Pontes, R.L.2
Guedes, D.3
-
129
-
-
84962455237
-
-
Nmap
-
Nmap. [Online]. Available: http://nmap.org/
-
-
-
-
130
-
-
84962475942
-
-
Cisco onePK
-
Cisco onePK. [Online]. Available: http://www.cisco.com/c/en/us/products/ios-nx-os-software/onepk.html
-
-
-
-
133
-
-
84962345782
-
-
IETF LISP (Locator/ID Separation Protocol)
-
IETF LISP (Locator/ID Separation Protocol). [Online]. Available: http://datatracker.ietf.org/wg/lisp
-
-
-
-
134
-
-
84906776422
-
Deployment of intrusion prevention system based on software defined networking
-
L. Zhang, G. Shou, Y. Hu, and Z. Guo, "Deployment of intrusion prevention system based on software defined networking," in Proc. IEEE 15th ICCT, 2013, pp. 26-31.
-
(2013)
Proc. IEEE 15th ICCT
, pp. 26-31
-
-
Zhang, L.1
Shou, G.2
Hu, Y.3
Guo, Z.4
-
135
-
-
84908565991
-
Rethinking Flow Classification in SDN
-
H. Farhadi and A. Nakao, "Rethinking Flow Classification in SDN," in Proc. IEEE IC2E, 2014, pp. 598-603.
-
(2014)
Proc. IEEE IC2E
, pp. 598-603
-
-
Farhadi, H.1
Nakao, A.2
-
136
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
3rd Quart.
-
S. Zander, G. J. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," IEEE Commun. Surveys Tuts., vol. 9, no. 3, pp. 44-57, 3rd Quart. 2007.
-
(2007)
IEEE Commun. Surveys Tuts.
, vol.9
, Issue.3
, pp. 44-57
-
-
Zander, S.1
Armitage, G.J.2
Branch, P.3
-
137
-
-
84863898754
-
Elastic IP and security groups implementation using OpenFlow
-
G. Stabler, A. Rosen, S. Goasguen, and K.-C. Wang, "Elastic IP and security groups implementation using OpenFlow," in Proc. 6th Int. Workshop Virtualization Technol. Distrib. Comput. Date, 2012, pp. 53-60.
-
(2012)
Proc. 6th Int. Workshop Virtualization Technol. Distrib. Comput. Date
, pp. 53-60
-
-
Stabler, G.1
Rosen, A.2
Goasguen, S.3
Wang, K.-C.4
-
138
-
-
84866345800
-
LiveSec: Towards effective security management in large-scale production networks
-
K. Wang, Y. Qi, B. Yang, Y. Xue, and J. Li, "LiveSec: Towards effective security management in large-scale production networks," in Proc. 32nd ICDCSW, 2012, pp. 451-460.
-
(2012)
Proc. 32nd ICDCSW
, pp. 451-460
-
-
Wang, K.1
Qi, Y.2
Yang, B.3
Xue, Y.4
Li, J.5
-
139
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sep.
-
B. C. Neuman and T. Tso, "Kerberos: An authentication service for computer networks," IEEE Commun. Mag., vol. 32, no. 9, pp. 33-38, Sep. 1994.
-
(1994)
IEEE Commun. Mag.
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Tso, T.2
-
140
-
-
51849087670
-
Lightweight directory access protocol (LDAP): The protocol
-
"Lightweight directory access protocol (LDAP): The protocol," IETF RFC 4511, 2006.
-
(2006)
IETF RFC
, vol.4511
-
-
-
143
-
-
84894478621
-
A vision for cloud security
-
Feb.
-
H. Zhang, "A vision for cloud security," Netw. Security, vol. 2014, no. 2, pp. 12-15, Feb. 2014.
-
(2014)
Netw. Security
, vol.2014
, Issue.2
, pp. 12-15
-
-
Zhang, H.1
-
144
-
-
84962352412
-
-
Open Networking Foundation Security Working Group
-
Open Networking Foundation Security Working Group. [Online]. Available: https://www.opennetworking.org/technical-communities/areas/services
-
-
-
-
145
-
-
84962414898
-
-
SDN Architecture (Issue 1), Jun. 2014
-
SDN Architecture (Issue 1)," Jun. 2014. [Online]. Available: https://www.opennetworking.org/images/stories/downloads/sdn-resources/technical-reports/TR-SDN-ARCH-1.0-06062014.pdf
-
-
-
-
146
-
-
84962414889
-
-
ETSI ISG Network Functions Virtualization Security Expert Group
-
ETSI ISG Network Functions Virtualization Security Expert Group. Online]. Available: http://www.etsi.org/technologies-clusters/technologies/nfv
-
-
-
-
147
-
-
84962479193
-
-
Network Functions Virtualization (NFV) Oct.
-
Network Functions Virtualization (NFV)-NFV Security-Problem Statement v1. 1. 1, Oct. 2014. [Online]. Available: http://www.etsi.org/deliver/etsi-gs/NFV-SEC/001-099/001/01.01.01-60/gs-NFVSEC001v010101p.pdf
-
(2014)
NFV Security-Problem Statement v1.1.1
-
-
-
148
-
-
84962401333
-
-
Network Functions Virtualization (NFV) Dec.
-
Network Functions Virtualization (NFV)-NFV Security-Security and Trust Guidance v1. 1. 1, Dec. 2014. [Online]. Available: http://www.etsi.org/deliver/etsi-gs/NFV-SEC/001-099/003/01.01.01-60/gs-NFVSEC003v010101p.pdf
-
(2014)
NFV Security-Security and Trust Guidance v1.1.1
-
-
-
149
-
-
84962453063
-
Resolution 77-Standardization work in ITU-T for software-defined networking
-
Nov.
-
"Resolution 77-Standardization work in ITU-T for software-defined networking," ITU-T World Telecommunication Standardization Assembly, Tech. Rep., Nov. 2012. [Online]. Available: http://www.itu. int/en/iTU-T/wtsa12/Documents/resolutions/Resolution%2077.pdf
-
(2012)
ITU-T World Telecommunication Standardization Assembly, Tech. Rep.
-
-
-
158
-
-
84962459883
-
-
IRTF SDN Research Group
-
IRTF SDN Research Group. [Online]. Available: http://irtf.org/sdnrg
-
-
-
-
159
-
-
84890922557
-
The software-defined-networking research group
-
Nov. /Dec.
-
D. Meyer, "The software-defined-networking research group," IEEE Internet Comput., vol. 17, no. 6, pp. 84-87, Nov. /Dec. 2013.
-
(2013)
IEEE Internet Comput.
, vol.17
, Issue.6
, pp. 84-87
-
-
Meyer, D.1
-
160
-
-
84962479196
-
-
"OpenFlowSec.
-
"OpenFlowSec. [Online]. Available: http://www.openflowsec.org/SDNSuite.html
-
-
-
-
161
-
-
84962371915
-
-
OpenDaylight AAA. [Online]. Available: https://wiki.opendaylight.org/view/AAA:Main
-
OpenDaylight AAA
-
-
-
163
-
-
84962371926
-
-
OpenDaylight SNBI. [Online]. Available: https://wiki.opendaylight.org/view/SecureNetworkBootstrapping:Main
-
OpenDaylight SNBI
-
-
-
164
-
-
84962371925
-
-
Network Functions Virtualization-IntroductoryWhite Paper Oct.
-
Network Functions VirtualizationIntroductoryWhite Paper, Oct. 2012. Online]. Available: http://portal.etsi.org/NFV/NFV-White-Paper.pdf
-
(2012)
-
-
-
166
-
-
84865538933
-
A network in a laptop: Rapid prototyping for software-defined networks
-
B. Lantz, B. Heller, and N. McKeown, "A network in a laptop: Rapid prototyping for software-defined networks," in Proc. 9th ACM SIGCOMM Workshop Hot Topics Netw., 2010, p. 19.
-
(2010)
Proc. 9th ACM SIGCOMM Workshop Hot Topics Netw.
, pp. 19
-
-
Lantz, B.1
Heller, B.2
McKeown, N.3
-
167
-
-
84962459713
-
-
ProtoGENI
-
ProtoGENI, 2014. [Online]. Available: http://protogeni.net/
-
(2014)
-
-
-
168
-
-
84921403711
-
Collaborating with the enemy on network management
-
Basel, Switzerland: Springer-Verlag
-
C. Hall, et al., "Collaborating with the enemy on network management, in Security Protocols XXII. Basel, Switzerland: Springer-Verlag, 2014, pp. 154-162.
-
(2014)
Security Protocols XXII
, pp. 154-162
-
-
Hall, C.1
-
169
-
-
84907009899
-
Flowlevel state transition as a new switch primitive for SDN
-
M. Moshref, A. Bhargava, A. Gupta, M. Yu, and R. Govindan, "Flowlevel state transition as a new switch primitive for SDN," in Proc. 3rd Workshop Hot Topics Softw. Defined Netw., 2014, pp. 61-66.
-
(2014)
Proc. 3rd Workshop Hot Topics Softw. Defined Netw.
, pp. 61-66
-
-
Moshref, M.1
Bhargava, A.2
Gupta, A.3
Yu, M.4
Govindan, R.5
|