2018 IEEE International Conference on Communications (ICC) 2018
DOI: 10.1109/icc.2018.8422403
|View full text |Cite
|
Sign up to set email alerts
|

Game-Theoretic Approach to Malicious Controller Detection in Software Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…In a multi-controller architecture, the detection of fraudulent rules and malicious controller in [52,53] is achieved by replicating each rule setup request to multiple controllers simultaneously in order to check for rule consistency, which incurs a high overhead. In order to deal with the issue, requests are randomly replicated in [54].…”
Section: Related Workmentioning
confidence: 99%
“…In a multi-controller architecture, the detection of fraudulent rules and malicious controller in [52,53] is achieved by replicating each rule setup request to multiple controllers simultaneously in order to check for rule consistency, which incurs a high overhead. In order to deal with the issue, requests are randomly replicated in [54].…”
Section: Related Workmentioning
confidence: 99%