登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
SDN安全探讨:机遇与威胁并存
参考文献
  • [1] BEHESHTI N,ZHANG Ying.Fast failover for control traffic in software-defined networks[C]//Proc of IEEE Global Communication Conference.[S.l.]:IEEE Press,2012:2665-2670.. 2012
  • [2] McKEOWN N,ANDERSON T,BALAKRISHNAN H,et al.OpenFlow:enabling innovation in campus networks[J].ACM SIGCOMM Computer Communication Review,2008,38(2):69-74.. 2008
  • [3] Open Networking Foundation.Member listing[EB/OL].【2013-11-16】.https://www.opennetworking.org/membership/member-listing.. 2013
  • [4] ANTONATOS S,AKRITIDIS P,MARKATOS E P,et al.Defending against hitlist worms using network address space randomization[J].Computer Networks,2007,51 (12):3471-3490.. 2007
  • [5] JAFARIAN H J,Al-S E,DUAN Qi.OpenFlow random host mutation:transparent moving target defense using software defined networking[C]//Proc of the 1st Workshop on Hot Topics in Software Defined Networks.New York:ACM Press,2012:127-132.. 2012
  • [6] KUMAR S,SEHGAL R,BHATIA J S.Hybrid honeypot framework for malware collection and analysis[C]//Proc of the 7th International Conference on Industrial and Information Systems.[S.l.]:IEEE Press,2012:1-5.. 2012
  • [7] YEGANEH S H,GANJALI Y.Kandoo:a framework for efficient and scalable offloading of control applications[C]//Proc of the 1st Workshop on Hot Topics in Software Defined Networks.New York:ACM Press,2012:19-24.. 2012
  • [8] KSHIRSAGAR D D,TAGAD D K,SALE S S,et al.Network intrusion detection based on attack pattern[C]//Proc of the 3rd International Conference on Electronics Computer Technology.[S.l.]:IEEE Press,2011:283-286.. 2011
  • [9] CHEN E Y,YONEZAWA A.Practical techniques for defending against DDoS attacks[C]//Proc of the 3rd ACS/IEEE International Conference on Computer Systems and Applications.2005.. 2005
  • [10] LI C,YANG Cun-gang,QIN Ling,et al.Intergrating role-based access control model with Web server[C]//Proc of the 2nd International Conference on Applications of Digital Information and Web Technologies.[S.l.]:IEEE Press,2009:615-618.. 2009
  • [11] SHERWOOD R,GIBB G,YAP K K,et al.FlowVisor:a network virtualization layer[R].[S.l.]:OpenFlow Switch Consortium,2009.. 2009
  • [12] SHIN S,PORRAS P,YEGNESWARAN V,et al.FRESCO:modular composable security services for software-defined networks[C]//Proc of ISOC Network and Distributed System Security Symposium.San Diego:Internet Society,2013.. 2013
  • [13] PITT D.Trust in the cloud:the role of SDN[J].Network Security,2013(3):5-6.. 2013
  • [14] BRAGA R,MOTA E,PASSITO A.Lightweight DDoS flooding attack detection using NOX/OpenFlow[C]//Proc of the 35th Conference on Local Computer Networks.Washington DC:IEEE Computer Society,2010:408-415.. 2010
  • [15] JOSE L,YU Min-lan,REXFORD J.Online measurement of large traffic aggregates on commodity switches[C]//Proc of the 11th USENIX Workshop on Hot Topics in Management of Internet,Cloud,and Enterprise Networks and Services.Berkeley:USENIX Association,2011:13.. 2011
  • [16] YAMASAKI Y,MIYAMOTO Y,YAMATO J,et al.Flexible access management system for campus VLAN based on OpenFlow[C]//Proc of the 11th IEEE/IPSJ International Symposium on Applications and the Internet.[S.l.]:IEEE Press,2011:347-351.. 2011
  • [17] KINOSHITA S,WATANABE T,YAMATO J,et al.Implementation and evaluation of an OpenFlow-based access control system for wirless LAN roaming[C]//Proc of the 36th IEEE Annual Workshops on Computer Software and Applications.[S.l.]:IEEE Press,2012:82-87.. 2012
  • [18] NAYAK A,REIMERS A,FEAMSTER N,et al.Resonance:dynamic access control for enterprise networks[C]//Proc of the 1st ACM SIGCOMM Workshop on Research on Enterprise Networking.New York:ACM Press,2009:11-18.. 2009
  • [19] Stanford University/BigSwitch Network.OpenFlow controller:SNAC (simple network access control)[EB/OL].【2013-11-17】.http://www.openflow.org/wp/snac.. 2013
  • [20] SHIN S,GU Guo-fei.CloudWatcher:network security monitoring using OpenFlow in dynamic cloud networks (or:How to provide security monitoring as a service in clouds?)[C]//Proc of the 20th IEEE International Conference on Network Protocols.Washington DC:IEEE Computer Society,2012:1-6.. 2012
  • [21] GABRIELLA C,vITTORIO M,ANTONIO M,et al.Exploiting SDN approach to tackle cloud computing security issues in the ATC scenario[C]//Dependable Computing.Berlin:Springer,2013:54-60.. 2013
  • [22] HARIS S H C,AHMAD R B,GHANI M A H A,et al.TCP SYN flood detection based on payload analysis[C]//Proc of IEEE Student Conference on Research and Development.[S.l.]:IEEE Press,2010:149-153.. 2010
  • [23] ZARGAR G R,KABIRI P.Identification of effective network features to detect Smurf attacks[C]//Proc of IEEE Student Conference on Research and Development.[S.1.]:IEEE Press,2009:49-52.. 2009
  • [24] IETF.SAVI status pages[E B/OL].【2013-11-18】.http://tools.ietf.org/wg/savi.. 2013
  • [25] YAO Guang,JUN Bi,XIAO Pei-yao.Source address validation solu-tion with OpenFlow/NOX architecture[C]//Proc of the 19th IEEInternational Conference on Network Protocols.[S.l.]:IEEE Press,2011:7-12.. 2011
  • [26] ATIGHETCHI M,PAL P,WEBBER F,et al.Adaptive use of network-centric mechanisms in cyber-defense[C]//Proc of the 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing.[S.I.]:IEEE Press,2003:183-192.. 2003
  • [27] WANG Xiao-jing,XIAO You-lin.IP traceback based on deterministic packet marking and logging[C]//Proc of International Conference on Scalable Computing and Communications & the 8th International Conference on Embedded Computing.[S.l.]:IEEE Press,2009:178-182.. 2009
  • [28] ARMKNECHT F,GASMI Y,SADEGHI A R,et al.An efficient implementation of trusted channels based on OpenSSL[C]//Proc of the 3rd ACM Workshop on Scalable Trusted Computing.New York:ACM Press,2008:41-50.. 2008
  • [29] YUE Yu,SUN Hao,KONG Ya-nan.Expand the SSL/TLS protocol on trusted platform module[C]//Proc of International Conference on Computer Application and System Modeling.[S.l.]:IEEE Press,2010:48-51.. 2010
  • [30] HUNT R.New developments in network forensics-tools and techniques[C]//Proc of the 18th IEEE International Conference on Networks.[S.I.]:IEEE Press,2012:376-381.. 2012
  • [31] MANNAN M,Van OORSCHOT P C.Reducing threats from flawed security APIs:the banking PIN case[J].Computer & Security,2009,28 (6):410-420.. 2009
  • [32] FELT A,EVANS D.Privacy protection for social networking APIs[C]//Proc of Web 2.0 Security and Privacy Workshop.2008.. 2008
  • [33] KISSEL E,FERNANDES G,JAFFEE M,et al.Driving software defined networks with XSP[C]//Proc of IEEE International Conference on Communications.[S.l.]:IEEE Press,2012:6616-6621.. 2012
  • [34] HUANG Yao-wen,YU Fang,HANG C,et al.Securing Web application code by static analysis and runtime protection[C]//Proc of the 13th International Conference on World Wide Web.New York:ACM Press,2004:40-52.. 2004
  • [35] THURAISINGHAM B.Data mining for malicious code detection and security applications[C]//Proc of European Intelligence and Security Informatics Conference.[S.l.]:IEEE Press,2011:4-5.. 2011
  • [36] SON S,SHIN S,YEGNESWARAN V,et al.Model checking invariant security properties in OpenFlow[C]//Proc of IEEE International Conference on Communication.[S.l.]:IEEE Press,2013:1974-1979.. 2013
  • [37] FERGUSON A D,GUHA A,LIANG Chen,et al.Hierarchical policies for software defined networks[C]//Proc of the 1st Workshop on Hot TopiCs in Software Defined Networks.New York:ACM Press,2012:37-42.. 2012
  • [38] REITBLATT M,FOSTER N,REXFORD J,et al.Abstractions for network update[C]//Proc of ACM SIGCOMM Conference.New York:ACM Press,2012:323-334.. 2012
  • [39] RELTBLATT M,FOSTER N,REXFORD J,et al.Consistent updates for software-defined networks:change you can believe in![C]//Proc of the 10th ACM Workshop on Hot Topic in Networks.New York:ACM Press,2011.. 2011
  • [40] 左青云,陈鸣,赵广松,等.基于OpenFlow的SDN技术[J].软件学报,2013,24(5):1078-1097.. 2013
  • [41] Open Networking Foundation.Software-defined networking:the new norm for networks[R/OL].【2013-11-16】.https://www.opennet-working.org/images/stories/dowaloads/sdnresources/white-papers/wpsdn-newnorm.pdf.. 2013
  • [42] ZARGAR S T,JOSHI J,TIPPER D.A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks[J].IEEE Communications Surveys & Tutorials,2013,15 (4):2046-2069.. 2013
  • [43] ZHOU Wan-lei.Keynote Ⅲ:detection and traceback of DDoS attacks[C]//Proc of the 8th IEEE International Conference on Computer and Information Technology.[S.l.]:IEEE Press,2008.. 2008
  • [44] Real time threat mitigation through intelligent network quarantine[EB/OL].【2013-11-18】.http://www.opennetsummit.org/archivea/apr12/site/pdf/varmour.pdf.. 2013
  • [45] McGEER R.A safe,efficient update protocol for OpenFlow networks[C]//Proe of the 1st Workshop on Hot Topics in Software Defined Networks.New York:ACM Press,2012:61-66.. 2012
  • [46] Al-SHAER E,MARRERO W,El-ATAWY A,et al.Network configuration in a box:towards end-to-end verification of network reachability and security[C]//Proc of the 17th IEEE International Conference on Network Protocols.[S.l.]:IEEE Press,2009:123-132.. 2009
  • [47] Al-SHAER E,Al-HAJ S.FlowChecker:configuration analysis and verification of federated OpenFlow infrastructures[C]//Proc of the 3rd ACM Workshop on Assurable and Usable Security Configuration.New York:ACM Press,2010:37-44.. 2010
  • [48] MAI Hao-hui,KHURSHID A,AGARWAL R,et al.Debugging the data plane with anteater[C]//Proc of ACM SIGCOMM Conference.New York:ACM Press,2011:290-301.. 2011
  • [49] AHMED K,ZHOU Wen-xuan,MATTHEW C,et al.VeriFlow:verifying network-wide invariants in real time[C]//Proc of the 1st Workshop on Hot Topics in Software Defined Networks.New York:ACM Press,2012:49-54.. 2012
  • [50] Trusted Computing Group.TCG specification architecture overview[EB/OL].【2013-11-19】.http://www.trustedcomputinggroup.org/groups.. 2013
  • [51] BOND M,ANDERSON R.API-level attacks on embedded systems[J].Computer of IEEE,2001,34(10):67-75.. 2001
  • [52] MIT technology review[EB/OL].【2013-11-17】.http://www.technologyreview.com/.. 2013
  • [53] PORRAS P,SHIN S,YEGNESWARAN V,et al.A security enforcement kernel for OpenFlow networks[C]//Proc of the 1st Work-shop on Hot Topics in Software Defined Networks.New York:ACM Press,2012:121-126.. 2012
查看更多︾
相似文献 查看更多>>
18.208.159.25