The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015 IEEE 14th International Symposium on Network Computing and Applications 2015
DOI: 10.1109/nca.2015.11
|View full text |Cite
|
Sign up to set email alerts
|

Extending the Floodlight Controller

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…In the context of security, Floodlight is a Java-based opensource SDN controller that supports virtual switches. This makes it easier to develop and test modules in a flexible and extendable way to react to changes in network configuration [196]. Security-Enhanced (SE) Floodlight controller [197] offers a comprehensive security mediation for the SDN control layer and adds a secure programmable northbound API, which specifically enforces the privilege separation principle.…”
Section: ) Sdn and Nfv Technologiesmentioning
confidence: 99%
“…In the context of security, Floodlight is a Java-based opensource SDN controller that supports virtual switches. This makes it easier to develop and test modules in a flexible and extendable way to react to changes in network configuration [196]. Security-Enhanced (SE) Floodlight controller [197] offers a comprehensive security mediation for the SDN control layer and adds a secure programmable northbound API, which specifically enforces the privilege separation principle.…”
Section: ) Sdn and Nfv Technologiesmentioning
confidence: 99%
“…There are a number of investigations considering the victim‐based perspective for deployment location in the application plane 43,51,62,65,96 . In Maccherani et al., 51 Ha et al., 43 and Li et al., 143 the detection mechanisms are implemented on switches or middleboxes close to the victim.…”
Section: Solutions Focused On the Application Planementioning
confidence: 99%
“…In our work, the Floodlight is adopted as the OpenFlow controller. 36 The top layer of proposed structure is the internet, which provides a large number of servers to process uploaded data and download instructions and results. In Figure 1, the higher-layer facilities of the fixed RSU are connected via the wired-network to ensure the reliability of data transmission, eg, the connection between the fixed RSU and switch, the connection between the switch and controller, and the connection between the controller and internet.…”
Section: Figure 2 Procedures Of the Proposed Schemementioning
confidence: 99%
“…In our work, the Floodlight is adopted as the OpenFlow controller 36 . The top layer of proposed structure is the internet, which provides a large number of servers to process uploaded data and download instructions and results.…”
Section: Structures and Processesmentioning
confidence: 99%