메뉴 건너뛰기




Volumn 18, Issue 1, 2016, Pages 623-654

A survey of security in software defined networks

Author keywords

Network security; OpenFlow; SDN; Secure SDN architecture; Software defined networking

Indexed keywords

APPLICATION PROGRAMS; NETWORK ARCHITECTURE; SOFTWARE DEFINED NETWORKING; SURVEYS;

EID: 84962446555     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2015.2453114     Document Type: Review
Times cited : (410)

References (169)
  • 1
    • 0020177868 scopus 로고
    • Stored program controlled network
    • Sep.
    • S. Horing, J. Menard, and R. Staehler, "Stored program controlled network," Bell Syst. Tech. J., vol. 61, no. 7, pp. 1759-1778, Sep. 1982.
    • (1982) Bell Syst. Tech. J. , vol.61 , Issue.7 , pp. 1759-1778
    • Horing, S.1    Menard, J.2    Staehler, R.3
  • 3
    • 44249126961 scopus 로고    scopus 로고
    • SANE: A protection architecture for enterprise networks
    • M. Casado, et al., "SANE: A protection architecture for enterprise networks," in Proc. USENIX Security Symp., 2006, p. 10.
    • (2006) Proc. USENIX Security Symp. , pp. 10
    • Casado, M.1
  • 4
    • 36949033604 scopus 로고    scopus 로고
    • Ethane: Taking control of the enterprise
    • Oct.
    • M. Casado, et al., "Ethane: Taking control of the enterprise," in ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 1-12, Oct. 2007.
    • (2007) ACM SIGCOMM Comput. Commun. Rev. , vol.37 , Issue.4 , pp. 1-12
    • Casado, M.1
  • 5
    • 84962372731 scopus 로고    scopus 로고
    • OpenFlow: Enabling innovation in campus networks
    • Apr.
    • N. McKeown, et al., "OpenFlow: Enabling innovation in campus networks," ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, Apr. 2008.
    • (2008) ACM SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.2 , pp. 69-74
    • McKeown, N.1
  • 6
    • 84883290864 scopus 로고    scopus 로고
    • B4: Experience with a globally-deployed software defined WAN
    • S. Jain, et al., "B4: Experience with a globally-deployed software defined WAN," in Proc. ACM SIGCOMM Conf., 2013, pp. 3-14.
    • (2013) Proc. ACM SIGCOMM Conf. , pp. 3-14
    • Jain, S.1
  • 7
    • 84883284665 scopus 로고    scopus 로고
    • Ananta: Cloud scale load balancing
    • P. Patel, et al., "Ananta: Cloud scale load balancing," in Proc. ACM SIGCOMM Conf., 2013, pp. 207-218.
    • (2013) Proc. ACM SIGCOMM Conf. , pp. 207-218
    • Patel, P.1
  • 8
    • 84893718619 scopus 로고    scopus 로고
    • A software defined cloudgateway automation system using OpenFlow
    • Nov.
    • S. Natarajan, A. Ramaiah, and M. Mathen, "A software defined cloudgateway automation system using OpenFlow," in Proc. IEEE 2nd Int. Conf. CloudNet, Nov. 2013, pp. 219-226.
    • (2013) Proc. IEEE 2nd Int. Conf. CloudNet , pp. 219-226
    • Natarajan, S.1    Ramaiah, A.2    Mathen, M.3
  • 9
    • 84962424083 scopus 로고    scopus 로고
    • VMware, Inc., Palo Alto, CA, USA
    • VMware NSX Customer Story: Colt Decreases Data Center Networking Complexity, VMware, Inc., Palo Alto, CA, USA, 2014. [Online]. Available: http://blogs. vmware.com/networkvirtualization/2014/08/vmware-nsx-customer-story-colt-decreases-data-center-networkingcomplexity.html
    • (2014) VMware NSX Customer Story: Colt Decreases Data Center Networking Complexity
  • 11
    • 70350656962 scopus 로고    scopus 로고
    • NOX: Towards an operating system for networks
    • Jul.
    • N. Gude, et al., "NOX: Towards an operating system for networks," ACM SIGCOMM Comput. Commun. Rev., vol. 38, no. 3, pp. 105-110, Jul. 2008.
    • (2008) ACM SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.3 , pp. 105-110
    • Gude, N.1
  • 14
    • 84962424520 scopus 로고    scopus 로고
    • OpenDaylight: A Linux Foundation Collaborative Project
    • OpenDaylight: A Linux Foundation Collaborative Project, 2014. Online]. Available: http://www.opendaylight.org
    • (2014)
  • 15
    • 84962458135 scopus 로고    scopus 로고
    • OpenContrail
    • OpenContrail. [Online]. Available: http://opencontrail.org/
  • 16
    • 84857207112 scopus 로고    scopus 로고
    • Onix: A distributed control platform for large-scale production networks
    • T. Koponen, et al., "Onix: A distributed control platform for large-scale production networks," in Proc. OSDI, 2010, vol. 10, pp. 1-6.
    • (2010) Proc. OSDI , vol.10 , pp. 1-6
    • Koponen, T.1
  • 19
    • 84866524064 scopus 로고    scopus 로고
    • Kandoo: A framework for efficient and scalable offloading of control applications
    • S. H. Yeganeh and Y. Ganjali, "Kandoo: A framework for efficient and scalable offloading of control applications," in Proc. 1st Workshop Hot Topics Softw. Defined Netw., 2012, pp. 19-24.
    • (2012) Proc. 1st Workshop Hot Topics Softw. Defined Netw. , pp. 19-24
    • Yeganeh, S.H.1    Ganjali, Y.2
  • 22
    • 84903160009 scopus 로고    scopus 로고
    • Interfaces, attributes, and use cases: A compass for SDN
    • Jun.
    • M. Jarschel, T. Zinner, T. Hofeld, P. Tran-Gia, and W. Kellerer, "Interfaces, attributes, and use cases: A compass for SDN," IEEE Commun. Mag., vol. 52, no. 6, pp. 210-217, Jun. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.6 , pp. 210-217
    • Jarschel, M.1    Zinner, T.2    Hofeld, T.3    Tran-Gia, P.4    Kellerer, W.5
  • 23
    • 84962426414 scopus 로고    scopus 로고
    • ONF Specifications
    • ONF Specifications. [Online]. Available: https://www.opennetworking.org/sdn-resources/technical-library
  • 25
    • 84896800526 scopus 로고    scopus 로고
    • M. S. thesis, Inst. Tech. Inf. Commun., Swiss Federal Inst. Technol. Zurich, Zurich, Switzerland, Apr.
    • R. Kloeti, "OpenFlow: A security analysis," M. S. thesis, Inst. Tech. Inf. Commun., Swiss Federal Inst. Technol. Zurich, Zurich, Switzerland, Apr. 2013. [Online]. Available: ftp://yosemite. ee. ethz. ch/pub/students/2012-HS/MA-2012-20-signed.pdf
    • (2013) OpenFlow: A Security Analysis
    • Kloeti, R.1
  • 28
    • 84863164091 scopus 로고    scopus 로고
    • Evaluation of security vulnerabilities by using ProtoGENI as a launchpad
    • D. Li, X. Hong, and J. Bowman, "Evaluation of security vulnerabilities by using ProtoGENI as a launchpad," in Proc. IEEEGLOBECOM, 2011, pp. 1-6.
    • (2011) Proc. IEEEGLOBECOM , pp. 1-6
    • Li, D.1    Hong, X.2    Bowman, J.3
  • 31
    • 84922828146 scopus 로고    scopus 로고
    • Blessing or curse? Revisiting security aspects of software-defined networking
    • L. Schehlmann, S. Abt, and H. Baier, "Blessing or curse? Revisiting security aspects of software-defined networking," in Proc. 10th Int. CNSM, 2014, pp. 382-387.
    • (2014) Proc. 10th Int. CNSM , pp. 382-387
    • Schehlmann, L.1    Abt, S.2    Baier, H.3
  • 33
    • 84901399118 scopus 로고    scopus 로고
    • Software defined networking for security enhancement in wireless mobile networks
    • Jun.
    • A. Y. Ding, J. Crowcroft, S. Tarkoma, and H. Flinck, "Software defined networking for security enhancement in wireless mobile networks," Comput. Netw., vol. 66, pp. 94-101, Jun. 2014.
    • (2014) Comput. Netw. , vol.66 , pp. 94-101
    • Ding, A.Y.1    Crowcroft, J.2    Tarkoma, S.3    Flinck, H.4
  • 34
    • 84929904066 scopus 로고    scopus 로고
    • Cloud computing security: What changes with software-defined networking?
    • New York NY USA: Springer-Verlag
    • M. Tsugawa, A. Matsunaga, and J. A. Fortes, "Cloud computing security: What changes with software-defined networking?" in Secure Cloud Computing. New York, NY, USA: Springer-Verlag, 2014, pp. 77-93.
    • (2014) Secure Cloud Computing , pp. 77-93
    • Tsugawa, M.1    Matsunaga, A.2    Fortes, J.A.3
  • 35
    • 33847258361 scopus 로고    scopus 로고
    • Threat modelinguncover security design flaws using the stride approach
    • S. Hernan, S. Lambert, T. Ostwald, and A. Shostack, "Threat modelinguncover security design flaws using the stride approach," MSDN Magazine-Louisville, 2006, pp. 68-75.
    • (2006) MSDN Magazine-Louisville , pp. 68-75
    • Hernan, S.1    Lambert, S.2    Ostwald, T.3    Shostack, A.4
  • 37
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds," in Proc. 16th ACM Conf. CCS, 2009, pp. 199-212.
    • (2009) Proc. 16th ACM Conf. CCS , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 38
    • 78149258537 scopus 로고    scopus 로고
    • FlowVisor: A network virtualization layer
    • Deutsche Telekom Inc. R&D Lab, Stanford, Nicira Networks, Tech. Rep.
    • R. Sherwood, et al., "FlowVisor: A network virtualization layer," Open-Flow Switch Consortium, Deutsche Telekom Inc. R&D Lab, Stanford, Nicira Networks, Tech. Rep., 2009.
    • (2009) Open-Flow Switch Consortium
    • Sherwood, R.1
  • 40
    • 84962402161 scopus 로고    scopus 로고
    • OpenVirtex (OVX)
    • OpenVirtex (OVX) Network Hypervisor. [Online]. Available: www.openvirtex.org
    • Network Hypervisor
  • 41
    • 84875747956 scopus 로고    scopus 로고
    • Scalable network virtualization in software-defined networks
    • Mar. /Apr.
    • D. Drutskoy, E. Keller, and J. Rexford, "Scalable network virtualization in software-defined networks," IEEE Internet Comput., vol. 17, no. 2, pp. 20-27, Mar. /Apr. 2013.
    • (2013) IEEE Internet Comput. , vol.17 , Issue.2 , pp. 20-27
    • Drutskoy, D.1    Keller, E.2    Rexford, J.3
  • 42
    • 84962424516 scopus 로고    scopus 로고
    • SDN Dev Center: Unlock Network Innovation, Hewlett Packard Company, Palo Alto, CA, USA
    • SDN Dev Center: Unlock Network Innovation, Hewlett Packard Company, Palo Alto, CA, USA, 2014. [Online]. Available: www.hp. com/go/sdndevcenter
    • (2014)
  • 43
    • 84880545424 scopus 로고    scopus 로고
    • Are we ready for SDN? Implementation challenges for software-defined networks
    • Jul.
    • S. Sezer, et al., "Are we ready for SDN? Implementation challenges for software-defined networks," IEEE Commun. Mag., vol. 51, no. 7, pp. 36-43, Jul. 2013.
    • (2013) IEEE Commun. Mag. , vol.51 , Issue.7 , pp. 36-43
    • Sezer, S.1
  • 44
    • 84962424510 scopus 로고    scopus 로고
    • Securing distributed control of software defined networks
    • Sep.
    • M. M. O. Othman and K. Okamura, "Securing distributed control of software defined networks," Int. J. Comput. Sci. Netw. Security, vol. 13, no. 9, pp. 5-14, Sep. 2013.
    • (2013) Int. J. Comput. Sci. Netw. Security , vol.13 , Issue.9 , pp. 5-14
    • Othman, M.M.O.1    Okamura, K.2
  • 45
    • 84906997419 scopus 로고    scopus 로고
    • Byzantine-resilient secure softwaredefined networks with multiple controllers
    • H. Li, P. Li, S. Guo, and S. Yu, "Byzantine-resilient secure softwaredefined networks with multiple controllers," in Proc. IEEE ICC, 2014, pp. 695-700.
    • (2014) Proc. IEEE ICC , pp. 695-700
    • Li, H.1    Li, P.2    Guo, S.3    Yu, S.4
  • 46
    • 84893363124 scopus 로고    scopus 로고
    • Authentication for resilience: The case of SDN
    • Berlin, Germany: Springer-Verlag
    • D. Yu, A. W. Moore, C. Hall, and R. Anderson, "Authentication for resilience: The case of SDN," in ser. Security Protocols XXI. Berlin, Germany: Springer-Verlag, 2013, pp. 39-44.
    • (2013) Ser. Security Protocols XXI , pp. 39-44
    • Yu, D.1    Moore, A.W.2    Hall, C.3    Anderson, R.4
  • 50
    • 85049403057 scopus 로고    scopus 로고
    • Securing the software-defined network control layer
    • San Diego, CA, USA, Feb.
    • P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, "Securing the software-defined network control layer," in Proc. NDSS, San Diego, CA, USA, Feb. 2015, pp. 1-15.
    • (2015) Proc. NDSS , pp. 1-15
    • Porras, P.1    Cheung, S.2    Fong, M.3    Skinner, K.4    Yegneswaran, V.5
  • 53
    • 84910659073 scopus 로고    scopus 로고
    • Rosemary: A robust, secure, and high-performance network operating system
    • S. Shin, et al., "Rosemary: A robust, secure, and high-performance network operating system," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2014, pp. 78-89.
    • (2014) Proc. ACM SIGSAC Conf. Comput. Commun. Security , pp. 78-89
    • Shin, S.1
  • 56
    • 84864245314 scopus 로고    scopus 로고
    • A replication component for resilient OpenFlow-based networking
    • P. Fonseca, R. Bennesby, E. Mota, and A. Passito, "A replication component for resilient OpenFlow-based networking," in Proc. IEEE NOMS, 2012, pp. 933-939.
    • (2012) Proc. IEEE NOMS , pp. 933-939
    • Fonseca, P.1    Bennesby, R.2    Mota, E.3    Passito, A.4
  • 57
    • 84055179019 scopus 로고    scopus 로고
    • Source address validation solution with Open Flow/NOXarchitecture
    • G. Yao, J. Bi, and P. Xiao, "Source address validation solution with OpenFlow/NOXarchitecture,"inProc. 19thIEEEICNP, 2011, pp. 7-12.
    • (2011) Proc. 19th IEEE ICNP , pp. 7-12
    • Yao, G.1    Bi, J.2    Xiao, P.3
  • 60
    • 78650109005 scopus 로고    scopus 로고
    • FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures
    • E. Al-Shaer and S. Al-Haj, "FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures," in Proc. 3rd ACM Workshop Assurable Usable Security Config., 2010, pp. 37-44.
    • (2010) Proc. 3rd ACM Workshop Assurable Usable Security Config. , pp. 37-44
    • Al-Shaer, E.1    Al-Haj, S.2
  • 61
    • 84891358075 scopus 로고    scopus 로고
    • Model checking invariant security properties in OpenFlow
    • S. Son, S. Shin, V. Yegneswaran, P. Porras, and G. Gu, "Model checking invariant security properties in OpenFlow," Proc. IEEE Int. Conf. Commun., 2013, pp. 1974-1979. [Online]. Available: http://faculty.cse.tamu.edu/guofei/paper/Flover-ICC13.pdf
    • (2013) Proc. IEEE Int. Conf. Commun. , pp. 1974-1979
    • Son, S.1    Shin, S.2    Yegneswaran, V.3    Porras, P.4    Gu, G.5
  • 62
    • 80053150074 scopus 로고    scopus 로고
    • Debugging the data plane with anteater
    • Aug.
    • H. Mai, et al., "Debugging the data plane with anteater," ACM SIGCOMM Comput. Commun. Rev., vol. 41, no. 4, pp. 290-301, Aug. 2011.
    • (2011) ACM SIGCOMM Comput. Commun. Rev. , vol.41 , Issue.4 , pp. 290-301
    • Mai, H.1
  • 63
    • 84893267876 scopus 로고    scopus 로고
    • VeriFlow: Verifying network-wide invariants in real time
    • Oct.
    • A. Khurshid, W. Zhou, M. Caesar, and P. Godfrey, "VeriFlow: Verifying network-wide invariants in real time," ACM SIGCOMM Comput. Commun. Rev., vol. 42, no. 4, pp. 467-472, Oct. 2012.
    • (2012) ACM SIGCOMM Comput. Commun. Rev. , vol.42 , Issue.4 , pp. 467-472
    • Khurshid, A.1    Zhou, W.2    Caesar, M.3    Godfrey, P.4
  • 64
    • 85076709056 scopus 로고    scopus 로고
    • Real time network policy checking using header space analysis
    • P. Kazemian, et al., "Real time network policy checking using header space analysis," in Proc. USENIX Symp. NSDI, 2013, pp. 99-112.
    • (2013) Proc. USENIX Symp. NSDI , pp. 99-112
    • Kazemian, P.1
  • 66
    • 85094658658 scopus 로고    scopus 로고
    • Towards a reliable SDN firewall
    • Santa Clara, CA, USA
    • H. Hu, G.-J. Ahn, W. Han, and Z. Zhao, "Towards a reliable SDN firewall," presented at the Open Networking Summit, Santa Clara, CA, USA, 2014.
    • (2014) Open Networking Summit
    • Hu, H.1    Ahn, G.-J.2    Han, W.3    Zhao, Z.4
  • 68
    • 84958529476 scopus 로고    scopus 로고
    • LPM: Layered policy management for software-defined networks
    • Berlin, Germany: Springer-Verlag
    • W. Han, H. Hu, and G.-J. Ahn, "LPM: Layered policy management for software-defined networks," Data and Applications Security and Privacy XXVIII. Berlin, Germany: Springer-Verlag, 2014, pp. 356-363.
    • (2014) Data and Applications Security and Privacy XXVIII , pp. 356-363
    • Han, W.1    Hu, H.2    Ahn, G.-J.3
  • 69
    • 80053341773 scopus 로고    scopus 로고
    • Frenetic: A network programming language
    • Sep.
    • N. Foster, et al., "Frenetic: A network programming language," ACM SIGPLAN Notices, vol. 46, no. 9, pp. 279-291, Sep. 2011.
    • (2011) ACM SIGPLAN Notices , vol.46 , Issue.9 , pp. 279-291
    • Foster, N.1
  • 72
    • 84893515786 scopus 로고    scopus 로고
    • On the feasibility of a consistent and fault-tolerant data store for SDNs
    • F. A. Botelho, F. M. V. Ramos, D. Kreutz, and A. N. Bessani, "On the feasibility of a consistent and fault-tolerant data store for SDNs," in Proc. 2nd EWSDN, 2013, pp. 38-43.
    • (2013) Proc. 2nd EWSDN , pp. 38-43
    • Botelho, F.A.1    Ramos, F.M.V.2    Kreutz, D.3    Bessani, A.N.4
  • 75
    • 84880119818 scopus 로고    scopus 로고
    • Machine-verified network controllers
    • Jun.
    • A. Guha, M. Reitblatt, and N. Foster, "Machine-verified network controllers," ACM SIGPLAN Notices, vol. 48, no. 6, pp. 483-494, Jun. 2013.
    • (2013) ACM SIGPLAN Notices , vol.48 , Issue.6 , pp. 483-494
    • Guha, A.1    Reitblatt, M.2    Foster, N.3
  • 80
    • 84893365261 scopus 로고    scopus 로고
    • FRESCO: Modular composable security services for software-defined networks
    • San Diego, CA, USA
    • S. Shin, et al., "FRESCO: Modular composable security services for software-defined networks," in Proc. Netw. Distrib. Security Symp., San Diego, CA, USA, 2013, pp. 1-16.
    • (2013) Proc. Netw. Distrib. Security Symp. , pp. 1-16
    • Shin, S.1
  • 82
    • 84966332941 scopus 로고    scopus 로고
    • Design and deployment of secure, robust and resilient SDN controllers
    • S. Scott-Hayward, "Design and deployment of secure, robust and resilient SDN controllers," in Proc. IEEE Conf. NetSoft, 2015, pp. 1-5.
    • (2015) Proc. IEEE Conf. NetSoft , pp. 1-5
    • Scott-Hayward, S.1
  • 83
    • 84921064074 scopus 로고    scopus 로고
    • On the design of practical fault-tolerant SDN controllers
    • F. Botelho, A. Bessani, F. M. Ramos, and P. Ferreira, "On the design of practical fault-tolerant SDN controllers," in Proc. 3rd EWSDN, 2014, pp. 73-78.
    • (2014) Proc. 3rd EWSDN , pp. 73-78
    • Botelho, F.1    Bessani, A.2    Ramos, F.M.3    Ferreira, P.4
  • 84
    • 85074798835 scopus 로고    scopus 로고
    • Header space analysis: Static checking for networks
    • P. Kazemian, G. Varghese, and N. McKeown, "Header space analysis: Static checking for networks," in Proc. NSDI, 2012, pp. 113-126.
    • (2012) Proc. NSDI , pp. 113-126
    • Kazemian, P.1    Varghese, G.2    McKeown, N.3
  • 86
    • 84859924359 scopus 로고    scopus 로고
    • Efficient conflict detection in flowbased virtualized networks
    • Jan.
    • S. Natarajan, X. Huang, and T. Wolf, "Efficient conflict detection in flowbased virtualized networks," in Proc. ICNC, Jan. 2012, pp. 690-696.
    • (2012) Proc. ICNC , pp. 690-696
    • Natarajan, S.1    Huang, X.2    Wolf, T.3
  • 88
    • 84897109717 scopus 로고    scopus 로고
    • Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
    • Apr.
    • K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments," Comput. Netw., vol 62, pp. 122-136, Apr. 2013.
    • (2013) Comput. Netw. , vol.62 , pp. 122-136
    • Giotis, K.1    Argyropoulos, C.2    Androulidakis, G.3    Kalogeras, D.4    Maglaris, V.5
  • 91
    • 84891361284 scopus 로고    scopus 로고
    • NetFuse: Short-circuiting traffic surges in the cloud
    • Y. Wang, Y. Zhang, V. Singh, C. Lumezanu, and G. Jiang, "NetFuse: Short-circuiting traffic surges in the cloud," in Proc. IEEE ICC, 2013, pp. 3514-3518.
    • (2013) Proc. IEEE ICC , pp. 3514-3518
    • Wang, Y.1    Zhang, Y.2    Singh, V.3    Lumezanu, C.4    Jiang, G.5
  • 92
    • 84904165732 scopus 로고    scopus 로고
    • OrchSec: An orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions
    • A. Zaalouk, R. Khondoker, R. Marx, and K. Bayarou, "OrchSec: An orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions," in Proc. IEEE NOMS, 2014, pp. 1-9.
    • (2014) Proc. IEEE NOMS , pp. 1-9
    • Zaalouk, A.1    Khondoker, R.2    Marx, R.3    Bayarou, K.4
  • 96
    • 84866521295 scopus 로고    scopus 로고
    • OpenFlow random host mutation: Transparent moving target defense using software defined networking
    • J. H. Jafarian, E. Al-Shaer, and Q. Duan, "OpenFlow random host mutation: Transparent moving target defense using software defined networking," in Proc. 1st Workshop Hot Topics Softw. Defined Netw., 2012, pp. 127-132.
    • (2012) Proc. 1st Workshop Hot Topics Softw. Defined Netw. , pp. 127-132
    • Jafarian, J.H.1    Al-Shaer, E.2    Duan, Q.3
  • 98
    • 84897585209 scopus 로고    scopus 로고
    • NICE: Network intrusion detection and countermeasure selection in virtual network systems
    • Jul. /Aug.
    • C.-J. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, "NICE: Network intrusion detection and countermeasure selection in virtual network systems," IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 198-211, Jul. /Aug. 2013.
    • (2013) IEEE Trans. Dependable Secure Comput. , vol.10 , Issue.4 , pp. 198-211
    • Chung, C.-J.1    Khatkar, P.2    Xing, T.3    Lee, J.4    Huang, D.5
  • 99
    • 84885205587 scopus 로고    scopus 로고
    • SnortFlow: A OpenFlow-based intrusion prevention system in cloud environment
    • T. Xing, D. Huang, L. Xu, C.-J. Chung, and P. Khatkar, "SnortFlow: A OpenFlow-based intrusion prevention system in cloud environment," in Proc. 2nd GENI GREE Workshop, 2013, pp. 89-92.
    • (2013) Proc. 2nd GENI GREE Workshop , pp. 89-92
    • Xing, T.1    Huang, D.2    Xu, L.3    Chung, C.-J.4    Khatkar, P.5
  • 100
    • 84922792143 scopus 로고    scopus 로고
    • SDNIPS: Enabling software-defined networking based intrusion prevention system in clouds
    • T. Xing, Z. Xiong, D. Huang, and D. Medhi, "SDNIPS: Enabling software-defined networking based intrusion prevention system in clouds," in Proc. 10th Int. Conf. Netw. Serv. Manage., 2014, pp. 308-311.
    • (2014) Proc. 10th Int. Conf. Netw. Serv. Manage. , pp. 308-311
    • Xing, T.1    Xiong, Z.2    Huang, D.3    Medhi, D.4
  • 102
    • 84857255431 scopus 로고    scopus 로고
    • Revisiting traffic anomaly detection using software defined networking
    • Berlin, Germany: Springer-Verlag
    • S. A. Mehdi, J. Khalid, and S. A. Khayam, "Revisiting traffic anomaly detection using software defined networking," in Recent Advances in Intrusion Detection. Berlin, Germany: Springer-Verlag, 2011, pp. 161-180.
    • (2011) Recent Advances in Intrusion Detection , pp. 161-180
    • Mehdi, S.A.1    Khalid, J.2    Khayam, S.A.3
  • 103
    • 84898984732 scopus 로고    scopus 로고
    • A fuzzy logic-based information security management for software-defined networks
    • S. Dotcenko, A. Vladyko, and I. Letenko, "A fuzzy logic-based information security management for software-defined networks," in Proc. 16th ICACT, 2014, pp. 167-171.
    • (2014) Proc. 16th ICACT , pp. 167-171
    • Dotcenko, S.1    Vladyko, A.2    Letenko, I.3
  • 104
    • 79955041204 scopus 로고    scopus 로고
    • Lightweight DDoS flooding attack detection using NOX/OpenFlow
    • R. Braga, E. Mota, and A. Passito, "Lightweight DDoS flooding attack detection using NOX/OpenFlow," in Proc. IEEE 35th Conf. LCN, 2010, pp. 408-415.
    • (2010) Proc. IEEE 35th Conf. LCN , pp. 408-415
    • Braga, R.1    Mota, E.2    Passito, A.3
  • 105
    • 84962402837 scopus 로고    scopus 로고
    • Implementation of content-oriented networking architecture (CONA): A focus on DDoS countermeasure
    • Cambridge, U. K.
    • J. Suh, et al., "Implementation of content-oriented networking architecture (CONA): A focus on DDoS countermeasure," in Proc. European NetFPGA Developers Workshop, Cambridge, U. K., 2010, pp. 1-6.
    • (2010) Proc. European NetFPGA Developers Workshop , pp. 1-6
    • Suh, J.1
  • 107
    • 84906715175 scopus 로고    scopus 로고
    • A SDN-oriented DDoS blocking scheme for botnet-based attacks
    • S. Lim, J. Ha, H. Kim, Y. Kim, and S. Yang, "A SDN-oriented DDoS blocking scheme for botnet-based attacks," in Proc. 6th ICUFN, 2014, pp. 63-68.
    • (2014) Proc. 6th ICUFN , pp. 63-68
    • Lim, S.1    Ha, J.2    Kim, H.3    Kim, Y.4    Yang, S.5
  • 109
    • 85071935677 scopus 로고    scopus 로고
    • Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags
    • S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul, "Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags," in Proc. NSDI, 2014, pp. 533-546.
    • (2014) Proc. NSDI , pp. 533-546
    • Fayazbakhsh, S.K.1    Chiang, L.2    Sekar, V.3    Yu, M.4    Mogul, J.C.5
  • 110
    • 84883284152 scopus 로고    scopus 로고
    • SIMPLE-fying middlebox policy enforcement using SDN
    • Aug.
    • Z. A. Qazi, et al., "SIMPLE-fying middlebox policy enforcement using SDN," in Proc. ACM SIGCOMM, Aug. 2013, pp. 27-38.
    • (2013) Proc. ACM SIGCOMM , pp. 27-38
    • Qazi, Z.A.1
  • 111
    • 84962455251 scopus 로고    scopus 로고
    • Dynamic security traversal in OpenFlow networks with QoS guarantee
    • Y.-J. Chen, F.-Y. Lin, and L.-C. Wang, "Dynamic security traversal in OpenFlow networks with QoS guarantee," Int. J. Sci. Eng., vol. 4, no. 2, pp. 251-256, 2014.
    • (2014) Int. J. Sci. Eng. , vol.4 , Issue.2 , pp. 251-256
    • Chen, Y.-J.1    Lin, F.-Y.2    Wang, L.-C.3
  • 112
    • 80053147599 scopus 로고    scopus 로고
    • Design of the multi-level security network switch system which restricts covert channel
    • X. Liu, H. Xue, X. Feng, and Y. Dai, "Design of the multi-level security network switch system which restricts covert channel," in Proc. IEEE 3rd ICCSN, 2011, pp. 233-237.
    • (2011) Proc. IEEE 3rd ICCSN , pp. 233-237
    • Liu, X.1    Xue, H.2    Feng, X.3    Dai, Y.4
  • 113
    • 85043718049 scopus 로고    scopus 로고
    • Extensible and scalable network monitoring using OpenSAFE
    • J. R. Ballard, I. Rae, and A. Akella, "Extensible and scalable network monitoring using OpenSAFE," Proc. INM/WREN, 2010, p. 8.
    • (2010) Proc. INM/WREN , pp. 8
    • Ballard, J.R.1    Rae, I.2    Akella, A.3
  • 114
    • 84874562245 scopus 로고    scopus 로고
    • CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
    • S. Shin and G. Gu, "CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)," in Proc. 20th IEEE ICNP, 2012, pp. 1-6.
    • (2012) Proc. 20th IEEE ICNP , pp. 1-6
    • Shin, S.1    Gu, G.2
  • 115
    • 84928631572 scopus 로고    scopus 로고
    • Development of a secure traffic analysis system to trace malicious activities on internal networks
    • S. Hirono, Y. Yamaguchi, H. Shimada, and H. Takakura, "Development of a secure traffic analysis system to trace malicious activities on internal networks," in Proc. IEEE 38th Annu. COMPSAC Conf., 2014, pp. 305-310.
    • (2014) Proc. IEEE 38th Annu. COMPSAC Conf. , pp. 305-310
    • Hirono, S.1    Yamaguchi, Y.2    Shimada, H.3    Takakura, H.4
  • 117
    • 84934963911 scopus 로고    scopus 로고
    • SDN-driven authentication and access control system
    • V. Dangovas and F. Kuliesius, "SDN-driven authentication and access control system," in Proc. Int. Conf. DINWC, 2014, pp. 20-23.
    • (2014) Proc. Int. Conf. DINWC , pp. 20-23
    • Dangovas, V.1    Kuliesius, F.2
  • 119
    • 84900614780 scopus 로고    scopus 로고
    • Collaborative network security in multi-tenant data center for cloud computing
    • Feb.
    • Z. Chen, et al., "Collaborative network security in multi-tenant data center for cloud computing," Tsinghua Sci. Technol., vol. 19, no. 1, pp. 82-94, Feb. 2014.
    • (2014) Tsinghua Sci. Technol. , vol.19 , Issue.1 , pp. 82-94
    • Chen, Z.1
  • 120
    • 84908592944 scopus 로고    scopus 로고
    • A softwaredefined scalable and autonomous architecture for multi-tenancy
    • M. F. Ahmed, C. Talhi, M. Pourzandi, and M. Cheriet, "A softwaredefined scalable and autonomous architecture for multi-tenancy," in Proc. IEEE IC2E, 2014, pp. 568-573.
    • (2014) Proc. IEEE IC2E , pp. 568-573
    • Ahmed, M.F.1    Talhi, C.2    Pourzandi, M.3    Cheriet, M.4
  • 121
    • 84908200467 scopus 로고    scopus 로고
    • Tualatin: Towards network security service provision in cloud datacenters
    • X. Wang, Z. Liu, J. Li, B. Yang, and Y. Qi, "Tualatin: Towards network security service provision in cloud datacenters," in Proc. 23rd ICCCN, 2014, pp. 1-8.
    • (2014) Proc. 23rd ICCCN , pp. 1-8
    • Wang, X.1    Liu, Z.2    Li, J.3    Yang, B.4    Qi, Y.5
  • 124
    • 84893368816 scopus 로고    scopus 로고
    • An adaptive flow counting method for anomaly detection in SDN
    • Y. Zhang, "An adaptive flow counting method for anomaly detection in SDN," in Proc. 9th ACM Conf. Emerging Netw. Exp. Technol., 2013, pp. 25-30.
    • (2013) Proc. 9th ACM Conf. Emerging Netw. Exp. Technol. , pp. 25-30
    • Zhang, Y.1
  • 125
    • 84889067635 scopus 로고    scopus 로고
    • Efficient implementation of security applications in OpenFlow controller with FleXam
    • S. Shirali-Shahreza and Y. Ganjali, "Efficient implementation of security applications in OpenFlow controller with FleXam," in Proc. IEEE 21st Annu. Symp. HOTI, 2013, pp. 49-54.
    • (2013) Proc. IEEE 21st Annu. Symp. HOTI , pp. 49-54
    • Shirali-Shahreza, S.1    Ganjali, Y.2
  • 126
    • 85076681695 scopus 로고    scopus 로고
    • Software defined traffic measurement with OpenSketch
    • M. Yu, L. Jose, and R. Miao, "Software defined traffic measurement with OpenSketch," in Proc. 10th USENIX Symp. NSDI, 2013, pp. 29-42.
    • (2013) Proc. 10th USENIX Symp. NSDI , pp. 29-42
    • Yu, M.1    Jose, L.2    Miao, R.3
  • 127
    • 84889710187 scopus 로고    scopus 로고
    • Online measurement of large traffic aggregates on commodity switches
    • L. Jose, M. Yu, and J. Rexford, "Online measurement of large traffic aggregates on commodity switches," in Proc. USENIX HotICE Workshop, 2011, p. 13.
    • (2011) Proc. USENIX HotICE Workshop , pp. 13
    • Jose, L.1    Yu, M.2    Rexford, J.3
  • 128
    • 84898022001 scopus 로고    scopus 로고
    • Virtualized network isolation using software defined networks
    • R. V. Nunes, R. L. Pontes, and D. Guedes, "Virtualized network isolation using software defined networks," in Proc. IEEE 38th Conf. LCN, 2013, pp. 683-686.
    • (2013) Proc. IEEE 38th Conf. LCN , pp. 683-686
    • Nunes, R.V.1    Pontes, R.L.2    Guedes, D.3
  • 129
    • 84962455237 scopus 로고    scopus 로고
    • Nmap
    • Nmap. [Online]. Available: http://nmap.org/
  • 130
    • 84962475942 scopus 로고    scopus 로고
    • Cisco onePK
    • Cisco onePK. [Online]. Available: http://www.cisco.com/c/en/us/products/ios-nx-os-software/onepk.html
  • 133
    • 84962345782 scopus 로고    scopus 로고
    • IETF LISP (Locator/ID Separation Protocol)
    • IETF LISP (Locator/ID Separation Protocol). [Online]. Available: http://datatracker.ietf.org/wg/lisp
  • 134
    • 84906776422 scopus 로고    scopus 로고
    • Deployment of intrusion prevention system based on software defined networking
    • L. Zhang, G. Shou, Y. Hu, and Z. Guo, "Deployment of intrusion prevention system based on software defined networking," in Proc. IEEE 15th ICCT, 2013, pp. 26-31.
    • (2013) Proc. IEEE 15th ICCT , pp. 26-31
    • Zhang, L.1    Shou, G.2    Hu, Y.3    Guo, Z.4
  • 135
    • 84908565991 scopus 로고    scopus 로고
    • Rethinking Flow Classification in SDN
    • H. Farhadi and A. Nakao, "Rethinking Flow Classification in SDN," in Proc. IEEE IC2E, 2014, pp. 598-603.
    • (2014) Proc. IEEE IC2E , pp. 598-603
    • Farhadi, H.1    Nakao, A.2
  • 136
    • 44449087948 scopus 로고    scopus 로고
    • A survey of covert channels and countermeasures in computer network protocols
    • 3rd Quart.
    • S. Zander, G. J. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," IEEE Commun. Surveys Tuts., vol. 9, no. 3, pp. 44-57, 3rd Quart. 2007.
    • (2007) IEEE Commun. Surveys Tuts. , vol.9 , Issue.3 , pp. 44-57
    • Zander, S.1    Armitage, G.J.2    Branch, P.3
  • 138
    • 84866345800 scopus 로고    scopus 로고
    • LiveSec: Towards effective security management in large-scale production networks
    • K. Wang, Y. Qi, B. Yang, Y. Xue, and J. Li, "LiveSec: Towards effective security management in large-scale production networks," in Proc. 32nd ICDCSW, 2012, pp. 451-460.
    • (2012) Proc. 32nd ICDCSW , pp. 451-460
    • Wang, K.1    Qi, Y.2    Yang, B.3    Xue, Y.4    Li, J.5
  • 139
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sep.
    • B. C. Neuman and T. Tso, "Kerberos: An authentication service for computer networks," IEEE Commun. Mag., vol. 32, no. 9, pp. 33-38, Sep. 1994.
    • (1994) IEEE Commun. Mag. , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Tso, T.2
  • 140
    • 51849087670 scopus 로고    scopus 로고
    • Lightweight directory access protocol (LDAP): The protocol
    • "Lightweight directory access protocol (LDAP): The protocol," IETF RFC 4511, 2006.
    • (2006) IETF RFC , vol.4511
  • 143
    • 84894478621 scopus 로고    scopus 로고
    • A vision for cloud security
    • Feb.
    • H. Zhang, "A vision for cloud security," Netw. Security, vol. 2014, no. 2, pp. 12-15, Feb. 2014.
    • (2014) Netw. Security , vol.2014 , Issue.2 , pp. 12-15
    • Zhang, H.1
  • 144
    • 84962352412 scopus 로고    scopus 로고
    • Open Networking Foundation Security Working Group
    • Open Networking Foundation Security Working Group. [Online]. Available: https://www.opennetworking.org/technical-communities/areas/services
  • 145
    • 84962414898 scopus 로고    scopus 로고
    • SDN Architecture (Issue 1), Jun. 2014
    • SDN Architecture (Issue 1)," Jun. 2014. [Online]. Available: https://www.opennetworking.org/images/stories/downloads/sdn-resources/technical-reports/TR-SDN-ARCH-1.0-06062014.pdf
  • 146
    • 84962414889 scopus 로고    scopus 로고
    • ETSI ISG Network Functions Virtualization Security Expert Group
    • ETSI ISG Network Functions Virtualization Security Expert Group. Online]. Available: http://www.etsi.org/technologies-clusters/technologies/nfv
  • 147
    • 84962479193 scopus 로고    scopus 로고
    • Network Functions Virtualization (NFV) Oct.
    • Network Functions Virtualization (NFV)-NFV Security-Problem Statement v1. 1. 1, Oct. 2014. [Online]. Available: http://www.etsi.org/deliver/etsi-gs/NFV-SEC/001-099/001/01.01.01-60/gs-NFVSEC001v010101p.pdf
    • (2014) NFV Security-Problem Statement v1.1.1
  • 148
    • 84962401333 scopus 로고    scopus 로고
    • Network Functions Virtualization (NFV) Dec.
    • Network Functions Virtualization (NFV)-NFV Security-Security and Trust Guidance v1. 1. 1, Dec. 2014. [Online]. Available: http://www.etsi.org/deliver/etsi-gs/NFV-SEC/001-099/003/01.01.01-60/gs-NFVSEC003v010101p.pdf
    • (2014) NFV Security-Security and Trust Guidance v1.1.1
  • 149
    • 84962453063 scopus 로고    scopus 로고
    • Resolution 77-Standardization work in ITU-T for software-defined networking
    • Nov.
    • "Resolution 77-Standardization work in ITU-T for software-defined networking," ITU-T World Telecommunication Standardization Assembly, Tech. Rep., Nov. 2012. [Online]. Available: http://www.itu. int/en/iTU-T/wtsa12/Documents/resolutions/Resolution%2077.pdf
    • (2012) ITU-T World Telecommunication Standardization Assembly, Tech. Rep.
  • 158
    • 84962459883 scopus 로고    scopus 로고
    • IRTF SDN Research Group
    • IRTF SDN Research Group. [Online]. Available: http://irtf.org/sdnrg
  • 159
    • 84890922557 scopus 로고    scopus 로고
    • The software-defined-networking research group
    • Nov. /Dec.
    • D. Meyer, "The software-defined-networking research group," IEEE Internet Comput., vol. 17, no. 6, pp. 84-87, Nov. /Dec. 2013.
    • (2013) IEEE Internet Comput. , vol.17 , Issue.6 , pp. 84-87
    • Meyer, D.1
  • 160
    • 84962479196 scopus 로고    scopus 로고
    • "OpenFlowSec.
    • "OpenFlowSec. [Online]. Available: http://www.openflowsec.org/SDNSuite.html
  • 161
    • 84962371915 scopus 로고    scopus 로고
    • OpenDaylight AAA. [Online]. Available: https://wiki.opendaylight.org/view/AAA:Main
    • OpenDaylight AAA
  • 162
  • 163
    • 84962371926 scopus 로고    scopus 로고
    • OpenDaylight SNBI. [Online]. Available: https://wiki.opendaylight.org/view/SecureNetworkBootstrapping:Main
    • OpenDaylight SNBI
  • 164
    • 84962371925 scopus 로고    scopus 로고
    • Network Functions Virtualization-IntroductoryWhite Paper Oct.
    • Network Functions VirtualizationIntroductoryWhite Paper, Oct. 2012. Online]. Available: http://portal.etsi.org/NFV/NFV-White-Paper.pdf
    • (2012)
  • 167
    • 84962459713 scopus 로고    scopus 로고
    • ProtoGENI
    • ProtoGENI, 2014. [Online]. Available: http://protogeni.net/
    • (2014)
  • 168
    • 84921403711 scopus 로고    scopus 로고
    • Collaborating with the enemy on network management
    • Basel, Switzerland: Springer-Verlag
    • C. Hall, et al., "Collaborating with the enemy on network management, in Security Protocols XXII. Basel, Switzerland: Springer-Verlag, 2014, pp. 154-162.
    • (2014) Security Protocols XXII , pp. 154-162
    • Hall, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.