Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch
暂无分享,去创建一个
[1] Vitaly Shmatikov,et al. The most dangerous code in the world: validating SSL certificates in non-browser software , 2012, CCS.
[2] Mabry Tyson,et al. A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.
[3] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[4] Guofei Gu,et al. Attacking software-defined networks: a first feasibility study , 2013, HotSDN '13.
[5] Tuomas Aura,et al. Denial-of-Service Attacks in Bloom-Filter-Based Forwarding , 2014, IEEE/ACM Transactions on Networking.
[6] Kevin Benton,et al. OpenFlow vulnerability assessment , 2013, HotSDN '13.
[7] Paul Smith,et al. OpenFlow: A security analysis , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[8] Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
[9] Mabry Tyson,et al. FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.
[10] Jörg Ott,et al. Forwarding anomalies in Bloom filter-based multicast , 2011, 2011 Proceedings IEEE INFOCOM.
[11] Jukka Manner,et al. A Survey of Ethernet LAN Security , 2013, IEEE Communications Surveys & Tutorials.
[12] Martín Casado,et al. Onix: A Distributed Control Platform for Large-scale Production Networks , 2010, OSDI.
[13] Fernando M. V. Ramos,et al. Towards secure and dependable software-defined networks , 2013, HotSDN '13.