2021
DOI: 10.1109/access.2021.3055577
|View full text |Cite
|
Sign up to set email alerts
|

Securing Control and Data Planes From Reconnaissance Attacks Using Distributed Shadow Controllers, Reactive and Proactive Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…Hyder and Ismail [22] used port and IP shuffling to improve the security of SDN. Medina-López et al [23] used MTD approaches, by which when the messages are exchanged between hosts, their IP address is changed.…”
Section: Related Workmentioning
confidence: 99%
“…Hyder and Ismail [22] used port and IP shuffling to improve the security of SDN. Medina-López et al [23] used MTD approaches, by which when the messages are exchanged between hosts, their IP address is changed.…”
Section: Related Workmentioning
confidence: 99%
“…VCP filters undetermined traffic before forwarding it to the controller. Hyder et al 35 designed securing arrangement for the data and control plane of SDN-based MTD known as SDN-based Moving Target Defense for Control and Data planes Security (SMCDS). It utilized Shadow controllers in a distributed environment to enhance the control plane security for countering probing attacks.…”
Section: Crossfire Ddos Defense Techniques For Sdn and Nfvmentioning
confidence: 99%
“…Another solution proposed in the literature is the use of moving target defence, such as in [35] with the introduction of the notion of shadow controllers. Furthermore, in the case of detection of probing trafc, a part of the shadow controllers are randomly selected to respond to the trafc.…”
Section: Malicious Controller In Sdnmentioning
confidence: 99%
“…However, the techniques which use communication between the controllers, such as in [35], cannot be applied because we consider that the controller is faulty after the alarm. In addition, some methods cannot be applied as the methods proposed in [25] use non-Openfow packets named "Remap" or "Remap-Begin" to lead over the faulty controller.…”
Section: Recover Of the Attackmentioning
confidence: 99%
See 1 more Smart Citation