2016 IEEE NetSoft Conference and Workshops (NetSoft) 2016
DOI: 10.1109/netsoft.2016.7502486
|View full text |Cite
|
Sign up to set email alerts
|

Securing data planes in software-defined networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…The resulting forwarding rules and subnets for each setup are shown in Table I. We report that a similar methodology is also adopted by relevant work such as [8], [41].…”
Section: Methodsmentioning
confidence: 99%
“…The resulting forwarding rules and subnets for each setup are shown in Table I. We report that a similar methodology is also adopted by relevant work such as [8], [41].…”
Section: Methodsmentioning
confidence: 99%
“…The statistics-based approaches [20]- [27] discover forwarding anomalies by performing heavyweight flow statistics collection and analysis. Towards this end, they propose to collect various statistics, including OpenFlow flow statistics from all flow rules [20], port-based statistics [21], network counter rules [22], [23], [27], and packet trajectory data [24]. However, these solutions often impose significant communication overhead as they require to collect statistics from a vast majority of, if not all, flow rules.…”
Section: Statistics Analysis Based Anomaly Detectionmentioning
confidence: 99%
“…In general, the improvement of SDN security applications and controllers, and the online verification of network restrictions, separately, have been the prime focus of SDN security literature [6], [13]. Intrusion detection systems (IDSs) are important as prime defense techniques to protect network systems.…”
Section: Related Workmentioning
confidence: 99%