Adversarial Network Forensics in Software Defined Networking
暂无分享,去创建一个
Thomas F. La Porta | Trent Jaeger | Patrick D. McDaniel | Stefan Achleitner | P. Mcdaniel | S. Achleitner | T. F. Porta | T. Jaeger
[1] Ehab Al-Shaer,et al. FireCracker: A Framework for Inferring Firewall Policies using Smart Probing , 2007, 2007 IEEE International Conference on Network Protocols.
[2] Dan Pei,et al. Firewall fingerprinting , 2012, 2012 Proceedings IEEE INFOCOM.
[3] Brian E. Carpenter,et al. Observations of UDP to TCP Ratio and Port Numbers , 2010, 2010 Fifth International Conference on Internet Monitoring and Protection.
[4] Ehab Al-Shaer,et al. Adversary-aware IP address randomization for proactive agility against sophisticated attackers , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[5] Lei Xu,et al. Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures , 2015, NDSS.
[6] Ehab Al-Shaer,et al. Firewall Policy Reconnaissance: Techniques and Analysis , 2014, IEEE Transactions on Information Forensics and Security.
[7] Gail-Joon Ahn,et al. FLOWGUARD: building robust firewalls for software-defined networks , 2014, HotSDN.
[8] Felix Klaedtke,et al. Fingerprinting Software-Defined Networks , 2015, ICNP.
[9] Vijay Mann,et al. SPHINX: Detecting Security Attacks in Software-Defined Networks , 2015, NDSS.
[10] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[11] Vinod Yegneswaran,et al. AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks , 2013, CCS.
[12] Ghassan O. Karame,et al. On the Fingerprinting of Software-Defined Networks , 2016, IEEE Transactions on Information Forensics and Security.
[13] Avishai Wool. Architecting the Lumeta Firewall Analyzer , 2001, USENIX Security Symposium.
[14] Kpatcha M. Bayarou,et al. OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[15] Guofei Gu,et al. Attacking software-defined networks: a first feasibility study , 2013, HotSDN '13.