Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016) 2017
DOI: 10.2991/cnct-16.2017.13
|View full text |Cite
|
Sign up to set email alerts
|

SDNForensics: A Comprehensive Forensics Framework for Software Defined Network

Abstract: Abstract. Software-defined networking (SDN) is an emerging network architecture, which decouples the control and data planes of a network. Owing to its openness and standardization, SDN enables researchers to design and implement new innovative network functions and protocols in a much simpler and flexible way. However, the dynamism of programmable networks also brings potential new security challenges relating to various attacks such as scanning, spoofing attacks and denial-of-service attacks. We survey exist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 12 publications
0
3
0
1
Order By: Relevance
“…Çalışmalar güney arayüzünün veri toplamak için en iyi yerlerden biri olduğunu göstermiş olsa da [54] güney arayüzü tarafından işletilen süreçler saldırganların ana hedefidir [55]. YTA adli bilişimi için günlükler ve bellek bilgilerinin de dikkate alınması önerilmektedir [58].…”
Section: Yazilim Tanimli Ağlar Ve Ağ Adli̇ Bi̇li̇şi̇mi̇ (Software-def...unclassified
“…Çalışmalar güney arayüzünün veri toplamak için en iyi yerlerden biri olduğunu göstermiş olsa da [54] güney arayüzü tarafından işletilen süreçler saldırganların ana hedefidir [55]. YTA adli bilişimi için günlükler ve bellek bilgilerinin de dikkate alınması önerilmektedir [58].…”
Section: Yazilim Tanimli Ağlar Ve Ağ Adli̇ Bi̇li̇şi̇mi̇ (Software-def...unclassified
“…In the existing system, the time taken to complete the process is 0.09ms, but in the proposed method, improving malware detection by a continuous evaluation process, the time taken to identify the malware gets reduced to 0.04ms. Thus, the proposed system helps improve data security by reducing the processing time [19].…”
Section: Security Concerning the Processing Timementioning
confidence: 99%
“…Another framework for anomaly detection, classification, and mitigation for SDN is presented in [291] where unsupervised learning is used for traffic feature analysis. Zhang et al [292] have presented a forensic framework for SDN and recommended K-means clustering for anomaly detection in SDN. Another work [293] discusses the potential opportunities for using unsupervised learning for traffic classification in SDN.…”
Section: E Emerging Networking Applications Of Unsupervised Learningmentioning
confidence: 99%