[go: up one dir, main page]

Bidaj, 2016 - Google Patents

Security testing SDN controllers

Bidaj, 2016

View PDF
Document ID
6552324028929528089
Author
Bidaj A
Publication year

External Links

Snippet

Software-defined networking is a new paradigm that separates the network's control plane from the data plane. Many SDN controllers have been implemented since this concept was first introduced. As with other network models, security becomes an important requirement …
Continue reading at aaltodoc.aalto.fi (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Lee et al. Delta: A security assessment framework for software-defined networks.
Dreger et al. Dynamic application-layer protocol analysis for network intrusion detection
Jero et al. Beads: Automated attack discovery in openflow-based sdn systems
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
Trost Practical intrusion analysis: prevention and detection for the twenty-first century
Soltani et al. Security of topology discovery service in sdn: Vulnerabilities and countermeasures
Bidaj Security testing SDN controllers
Chebbi Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Zhang et al. Detection and Analysis of Broken Access Control Vulnerabilities in App–Cloud Interaction in IoT
Schulte et al. Netgator: Malware detection using program interactive challenges
Callegari et al. A new statistical method for detecting network anomalies in TCP traffic
Madison Honeyhive-A Network Intrusion Detection System Framework Utilizing Distributed Internet of Things Honeypot Sensors
Samant Automated penetration testing
Balzarotti Testing network intrusion detection systems.
Gupta Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
Sundman et al. Evaluating the usability of large language models as tools in cybersecurity: A comparison of censored and uncensored models in penetration testing and digital forensics
Radholm et al. Ethical Hacking of an IoT-device: Threat Assessment and Penetration Testing: A Survey on Security of a Smart Refrigerator
HINDAWI et al. Automated Penetration Tester in a Telecommunication Network
Magnusson Cyber Threat Emulation
Ajayi et al. P4Chain: A Multichain Approach for Real-Time Anomaly Traffic Detection in P4 Network
Stenhav Security evaluation of the Matrix Server-Server API
Caswell et al. Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications
Gjeka Threat-TLS: An Intrusion Detection and Monitoring Tool for Mitigating TLS Attacks
Sarıkoz An Information security framework for web services in enterprise networks
Piombino Intelligent forensics for the automatic anomaly detection in distributed infrastructures