Bidaj, 2016 - Google Patents
Security testing SDN controllersBidaj, 2016
View PDF- Document ID
- 6552324028929528089
- Author
- Bidaj A
- Publication year
External Links
Snippet
Software-defined networking is a new paradigm that separates the network's control plane from the data plane. Many SDN controllers have been implemented since this concept was first introduced. As with other network models, security becomes an important requirement …
- 238000000034 method 0 abstract description 55
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | Delta: A security assessment framework for software-defined networks. | |
Dreger et al. | Dynamic application-layer protocol analysis for network intrusion detection | |
Jero et al. | Beads: Automated attack discovery in openflow-based sdn systems | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Trost | Practical intrusion analysis: prevention and detection for the twenty-first century | |
Soltani et al. | Security of topology discovery service in sdn: Vulnerabilities and countermeasures | |
Bidaj | Security testing SDN controllers | |
Chebbi | Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers | |
Zhang et al. | Detection and Analysis of Broken Access Control Vulnerabilities in App–Cloud Interaction in IoT | |
Schulte et al. | Netgator: Malware detection using program interactive challenges | |
Callegari et al. | A new statistical method for detecting network anomalies in TCP traffic | |
Madison | Honeyhive-A Network Intrusion Detection System Framework Utilizing Distributed Internet of Things Honeypot Sensors | |
Samant | Automated penetration testing | |
Balzarotti | Testing network intrusion detection systems. | |
Gupta | Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh | |
Sundman et al. | Evaluating the usability of large language models as tools in cybersecurity: A comparison of censored and uncensored models in penetration testing and digital forensics | |
Radholm et al. | Ethical Hacking of an IoT-device: Threat Assessment and Penetration Testing: A Survey on Security of a Smart Refrigerator | |
HINDAWI et al. | Automated Penetration Tester in a Telecommunication Network | |
Magnusson | Cyber Threat Emulation | |
Ajayi et al. | P4Chain: A Multichain Approach for Real-Time Anomaly Traffic Detection in P4 Network | |
Stenhav | Security evaluation of the Matrix Server-Server API | |
Caswell et al. | Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications | |
Gjeka | Threat-TLS: An Intrusion Detection and Monitoring Tool for Mitigating TLS Attacks | |
Sarıkoz | An Information security framework for web services in enterprise networks | |
Piombino | Intelligent forensics for the automatic anomaly detection in distributed infrastructures |