透過您的圖書館登入
IP:18.118.150.80
  • 學位論文

利用惡意封包流規則對軟體定義網路之攻擊與解決方案

Populating Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures

指導教授 : 王國禎

摘要


並列摘要


無資料

並列關鍵字

Anomaly detection App context-aware event-based SDN

參考文獻


[1] S. Scott-Hayward, C. Kane, and S. Sezer, “Operationcheckpoint: SDN application control,” in Proceedings of the IEEE 22nd International Conference on Network Protocols, Oct 2014, pp. 618–623.
[2] S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh, and B. B. Kang, “Rosemary: A robust, secure, and high performance network operating system,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, ACM, 2014, pp. 78–89. [Online]. Available: http://doi.acm.org/10.1145/2660267.2660353
[3] X. Wen, B. Yang, Y. Chen, C. Hu, Y. Wang, B. Liu, and X. Chen, “SDNshield: Reconciliating configurable application permissions for SDN app markets,” in Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2016, pp. 121–132.
[4] P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, “A security enforcement kernel for Openflow networks,” in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ACM, 2012, pp. 121–126. [Online]. Available: http://doi.acm.org/10.1145/2342441.2342466
[5] P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, “Securing the Software-Defined Network Control Layer,” in Proceedings of the Network and Distributed System Security Symposium (NDSS), February 2015.

延伸閱讀