메뉴 건너뛰기




Volumn 2016-July, Issue , 2016, Pages

Contextual, flow-based access control with scalable host-based SDN techniques

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRICAL ENGINEERING;

EID: 84983268897     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2016.7524498     Document Type: Conference Paper
Times cited : (17)

References (41)
  • 1
    • 84983319251 scopus 로고    scopus 로고
    • Microsoft vulnerabilities study: Mitigating risk by removing user privileges
    • Microsoft vulnerabilities study: Mitigating risk by removing user privileges," in Avetco whitepaper, 2013
    • (2013) Avetco Whitepaper
  • 3
    • 84983321326 scopus 로고    scopus 로고
    • April
    • "Open vswitch manual," http://openvswitch.org/support/dist-docs/ovsbenchmark. 1.txt, April 2015
    • (2015)
  • 6
    • 33745211604 scopus 로고    scopus 로고
    • Live forensics: Diagnosing your system without killing it first
    • F. Adelstein, "Live forensics: diagnosing your system without killing it first," Communications of the ACM, vol. 49, no. 2, pp. 63-66, 2006
    • (2006) Communications of the ACM , vol.49 , Issue.2 , pp. 63-66
    • Adelstein, F.1
  • 7
    • 0002738343 scopus 로고
    • Security problems in the TCP/ip protocol suite
    • S. M. Bellovin, "Security problems in the tcp/ip protocol suite," ACM SIGCOMM Computer Communication Review, vol. 19, no. 2, pp. 32-48, 1989
    • (1989) ACM SIGCOMM Computer Communication Review , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 14
    • 85126494045 scopus 로고    scopus 로고
    • Bridging the host-network divide: Survey, taxonomy, and solution
    • ser. LISA '06. Berkeley, CA, USA: USENIX Association
    • G. A. Fink, V. Duggirala, R. Correa, and C. North, "Bridging the host-network divide: Survey, taxonomy, and solution," in Proceedings of the 20th Conference on Large Installation System Administration, ser. LISA '06. Berkeley, CA, USA: USENIX Association, 2006, pp. 20-20. [Online]. Available: http://dl.acm.org/citation.cfm?id=1267793.1267813
    • (2006) Proceedings of the 20th Conference on Large Installation System Administration , pp. 20
    • Fink, G.A.1    Duggirala, V.2    Correa, R.3    North, C.4
  • 16
    • 84983235959 scopus 로고    scopus 로고
    • Technology investigation of openflow and testing
    • July
    • GEANT, "Technology investigation of openflow and testing," GEANT Whitepaper DJ1-2.1. [Online] http://geant3.archive.geant.net/ Media Centre/Media Library/Media%20Library/GN3-13-003 DJ1-2-1 Technology-Investigation-of-OpenFlow-and-Testing.pdf, July 2013
    • (2013) GEANT Whitepaper DJ1-2.1
  • 20
    • 84983282979 scopus 로고    scopus 로고
    • IBM Data Sheet July
    • IBM Corporation, "Ibm system networking RackSwitch G8264," IBM Data Sheet [Online] http://www-01.ibm.com/common/ssi/cgibin/ ssialias?subtype=SPandinfotype=PMandappname=STGE QC QC USENandhtmlfid=QCD03020USENandattachment=QCD03020USEN. PDF#loaded, July 2014
    • (2014) IBM System Networking RackSwitch G8264
  • 21
    • 4444325873 scopus 로고
    • Identification protocol
    • February
    • M. S. Johns, "Identification protocol," IETF RFC 1413, February 1993
    • (1993) IETF RFC 1413
    • Johns, M.S.1
  • 25
    • 84968792791 scopus 로고    scopus 로고
    • C. Low, "Icmp attacks illustrated," SANS Institute URL: http://rr. sans. org/threats/ICMP attacks. php (12/11/2001), 2001
    • (2001) ICMP Attacks Illustrated
    • Low, C.1
  • 39


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.