Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study
暂无分享,去创建一个
Xin Wang | Neng Gao | Zongbin Liu | Lei Wang | Lingchen Zhang | Xin Wang | Zongbin Liu | Lingchen Zhang | Neng Gao | Lei Wang
[1] Vinod Yegneswaran,et al. Securing the Software Defined Network Control Layer , 2015, NDSS.
[2] Guofei Gu,et al. A First Step Toward Network Security Virtualization: From Concept To Prototype , 2015, IEEE Transactions on Information Forensics and Security.
[3] Vinod Yegneswaran,et al. AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks , 2013, CCS.
[4] George Varghese,et al. Usenix Association 10th Usenix Symposium on Networked Systems Design and Implementation (nsdi '13) 99 Real Time Network Policy Checking Using Header Space Analysis , 2022 .
[5] Zonghua Zhang,et al. Enabling security functions with SDN: A feasibility study , 2015, Comput. Networks.
[6] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[7] Vijay Mann,et al. SPHINX: Detecting Security Attacks in Software-Defined Networks , 2015, NDSS.
[8] Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
[9] George Varghese,et al. Header Space Analysis: Static Checking for Networks , 2012, NSDI.
[10] Lei Xu,et al. Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures , 2015, NDSS.