Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243799
|View full text |Cite
|
Sign up to set email alerts
|

Aim-SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Alternatively to the reactive techniques presented above, preventive methods focus on preventing the effects of attacks from causing degradation or unavailability in the network or services. Next, we discuss the studies that implement different preventive techniques in the control plane 114 …”
Section: Solutions Focused On the Control Planementioning
confidence: 99%
See 1 more Smart Citation
“…Alternatively to the reactive techniques presented above, preventive methods focus on preventing the effects of attacks from causing degradation or unavailability in the network or services. Next, we discuss the studies that implement different preventive techniques in the control plane 114 …”
Section: Solutions Focused On the Control Planementioning
confidence: 99%
“…Most of these studies are fully deployed on the SDN controller to protect both the controller and the network switches 128 . The controller can then monitor the entire network and apply different prevention, detection, or mitigation techniques 58,67,69,85,89,98,114,145‐147,152‐155 …”
Section: Solutions Focused On the Control Planementioning
confidence: 99%
“…For example, controllers such as OpenDayLight and ONOS use network management data storage architecture (NMDA) as the basic storage component. [23] found that a semantic gap problem in NMDA may lead to a risk of attackers tampering with the data in the controller. Spoofing and tampering are often intertwined and interdependent because deceiving network elements and controllers are the main motivations for tampering.…”
Section: Tamperingmentioning
confidence: 99%
“…A DoS attack against an SDN controller is a serious security threat, which may cause the controller to be unavailable and jeopardize network stability. PACKET_IN message flooding attack is a basic DoS attack method [23,24].…”
Section: Packet_in Message Flooding Attackmentioning
confidence: 99%
See 1 more Smart Citation