메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; CONTROLLERS; DENIAL-OF-SERVICE ATTACK; ELECTRIC LIGHTING; FLOODS; NETWORK PROTOCOLS; NETWORK SECURITY; NETWORK TOPOLOGY; VISIBILITY;

EID: 85117525688     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2015.23283     Document Type: Conference Paper
Times cited : (339)

References (32)
  • 2
    • 84892281249 scopus 로고    scopus 로고
    • Configuring port security. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec. html.
    • Configuring port security
  • 3
    • 85180551720 scopus 로고    scopus 로고
    • n-casting using openflow
    • n-casting using openflow. http://archive.openflow.org/wp/n-casting-mobility-using-openflow/.
  • 4
    • 84950126469 scopus 로고    scopus 로고
    • OpenFlow Specification v1.4.0. http://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-spec-v1.4.0.pdf.
    • OpenFlow Specification v1.4.0
  • 5
  • 7
    • 85180551041 scopus 로고    scopus 로고
    • Proxy ARP. http://www.cisco.com/c/en/us/support/docs/ip/dynamic-address-allocation-resolution/13718-5.html# howdoesproxyarpwork.
    • Proxy ARP
  • 20
    • 33344454992 scopus 로고    scopus 로고
    • Protection against the man-in-the-middle-attack for the kirchhoff-loop-johnson(-like)-noise cipher and expansion by voltage-based security
    • L.B. Kish. Protection against the man-in-the-middle-attack for the kirchhoff-loop-johnson(-like)-noise cipher and expansion by voltage-based security. In Fluctuation and Noise Letters 6 (2006) L57L63.
    • (2006) Fluctuation and Noise Letters , vol.6 , pp. L57L63
    • Kish, L.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.