2016 25th International Conference on Computer Communication and Networks (ICCCN) 2016
DOI: 10.1109/icccn.2016.7568520
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Network Security through Software Defined Networking (SDN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 104 publications
(64 citation statements)
references
References 27 publications
0
62
0
2
Order By: Relevance
“…In Shin et al, several examples of SDN‐based security applications are described, while the feasibility of deploying various security functions at the SDN control level has been investigated in Yoon et al Another survey focused on SDN's strengths and weaknesses against distributed denial‐of‐service (DDoS) attacks in cloud computing environments.…”
Section: Background On Sdn/nfv‐based Security Enablers For Iot Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…In Shin et al, several examples of SDN‐based security applications are described, while the feasibility of deploying various security functions at the SDN control level has been investigated in Yoon et al Another survey focused on SDN's strengths and weaknesses against distributed denial‐of‐service (DDoS) attacks in cloud computing environments.…”
Section: Background On Sdn/nfv‐based Security Enablers For Iot Networkmentioning
confidence: 99%
“…For example, the network administrator can implement anomaly analysis to identify network-wide attacks by monitoring the network state changes, for example, to detect anomalous traffic peaks generated by distributed botnet of compromised IoT devices. In Shin et al, 11 several examples of SDN-based security applications are described, while the feasibility of deploying various security functions at the SDN control level has been investigated in Yoon et al 12 Another survey 13 focused on SDN's strengths and weaknesses against distributed denial-of-service (DDoS) attacks in cloud computing environments.…”
Section: Sdn Security Mechanismsmentioning
confidence: 99%
“…This was the major problem in transmitting the intrusion based data packets. Shin et al suggested improvement to the network security that was constructed on the data plane. The software platform was also named as the management plane that helps control over the whole network flow.…”
Section: Related Workmentioning
confidence: 99%
“…With the development and application of SDN, the deficiency of itself to deal with security threats has gradually emerged [1]. The data layer devices receive instructions from the controller through the southbound interface and complete specific network data processing according to these instructions.…”
Section: Introductionmentioning
confidence: 99%