2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) 2021
DOI: 10.1109/csde53843.2021.9718377
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Timing Side-Channel Attacks in Software-Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Timing-based side-channel attacks are becoming increasingly prevalent in SDNs, owing to the separation of control and data planes [22]. In a previous study [23], we proposed the use of random delay to prevent timing side-channel attacks. Yoon et al [24] published an in-depth study on the risks posed by SDN.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Timing-based side-channel attacks are becoming increasingly prevalent in SDNs, owing to the separation of control and data planes [22]. In a previous study [23], we proposed the use of random delay to prevent timing side-channel attacks. Yoon et al [24] published an in-depth study on the risks posed by SDN.…”
Section: Related Workmentioning
confidence: 99%
“…The emphasis has predominantly been on modifying the network architecture to prevent such attacks rather than devising remedies to combat them. To detect timing-side channel attack activity, a machine learning-based approach was proposed as an initial effort [47]. This study represents a continuation of these efforts, providing a detailed comparison of machine learning classification techniques with the algorithm, as well as a comprehensive response solution.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations