2014 First International Science and Technology Conference (Modern Networking Technologies) (MoNeTeC) 2014
DOI: 10.1109/monetec.2014.6995602
|View full text |Cite
|
Sign up to set email alerts
|

SDN for network security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…However, the more recent analyses [24], [30]- [34] also identify security enhancements introduced by SDN.…”
Section: A Analyses Of Sdn Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…However, the more recent analyses [24], [30]- [34] also identify security enhancements introduced by SDN.…”
Section: A Analyses Of Sdn Securitymentioning
confidence: 99%
“…The extent to which network security management is improved in SDN-based networks is discussed in [30]. The discussion is split by infrastructure, software stack, and network protocols with the majority of the discussion focussed on protocol security, which the authors define as confidentiality and authentication.…”
Section: A Analyses Of Sdn Securitymentioning
confidence: 99%
“…Another example of IDS with these responsibilities is presented by Kumar et al [82]. Solutions based on packet classification using SDN are presented by Smeliansky et al [78] and the detection of malware is discussed in the work of Abaid et al [80]. Further, the PROTOGENI framework is presented by Li et al [83] and serves as a tool for creating and evaluating different types of network attacks.…”
Section: Securitymentioning
confidence: 99%
“…At present, SDN security research focuses on network traffic detection controller kernel security mechanism third-party application security authentication mechanism [1]. The research on network traffic detection mainly uses the statistical field of the flow table to analyze the traffic, and the abnormal flow detection is carried out after the normal flow data statistics is established.…”
Section: Introductionmentioning
confidence: 99%