2019
DOI: 10.1016/j.future.2018.08.011
|View full text |Cite
|
Sign up to set email alerts
|

Measuring the efficiency of SDN mitigations against attacks on computer infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…For example, an operator that measures the properties of the DDoS attacks that it handles (e.g., Mirai-based DDoS attacks [17] or incidents similar to the 2015 DDoS attack on the DNS root [18]) can include the metadata of these datasets in network descriptions along with a usage license. The advantage is that it becomes much easier for other operators to find such datasets and the licenses to use the data [19]. This enables them to collaboratively combine and learn from each other's measurements, which improves their collective incident response capabilities.…”
Section: Enabling Cross-network Operator Incident Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…For example, an operator that measures the properties of the DDoS attacks that it handles (e.g., Mirai-based DDoS attacks [17] or incidents similar to the 2015 DDoS attack on the DNS root [18]) can include the metadata of these datasets in network descriptions along with a usage license. The advantage is that it becomes much easier for other operators to find such datasets and the licenses to use the data [19]. This enables them to collaboratively combine and learn from each other's measurements, which improves their collective incident response capabilities.…”
Section: Enabling Cross-network Operator Incident Analysismentioning
confidence: 99%
“…Ultimately, we envision that a responsible Internet enables the real-time sharing of measurements across network operators, allowing them to collaboratively fend off security incidents as they occur (e.g., by dynamically moving scrubbing functionality to a specific part of their network using Network Function Virtualization (NFV) [19]) or even proactively before they can cause real harm. Network operators could share the actual measurements in various ways, such as directly from their own servers or through a shared platform in which multiple operators upload their measurements (e.g., DDoS fingerprints [20,21]).…”
Section: Enabling Cross-network Operator Incident Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The attack does not reach the target host. Some examples are Ingress/Egress 6 filters on routers, packet filtering on routers [14], and automatic learning to detect anomalies.…”
Section: B Defensive Mechanismsmentioning
confidence: 99%
“…We implement SARNET on top of VNET which provides an experimental platform for secure networking research [3,5].…”
Section: Multi-domain Sarnetmentioning
confidence: 99%