Abdelrahman et al., 2021 - Google Patents
Software‐defined networking security for private data center networks and clouds: vulnerabilities, attacks, countermeasures, and solutionsAbdelrahman et al., 2021
View PDF- Document ID
- 7016285415927169368
- Author
- Abdelrahman A
- Rodrigues J
- Mahmoud M
- Saleem K
- Das A
- Korotaev V
- Kozlov S
- Publication year
- Publication venue
- International Journal of Communication Systems
External Links
Snippet
Software‐defined networking (SDN) is an agile, modern networking approach that facilitates innovations in the networking paradigm. The abstracted and centralized network operating system facilitates the network management and reduces operational expenditure (OPEX) …
- 238000011160 research 0 abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0803—Configuration setting of network or network elements
- H04L41/0813—Changing of configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abdelrahman et al. | Software‐defined networking security for private data center networks and clouds: vulnerabilities, attacks, countermeasures, and solutions | |
Jangjou et al. | A comprehensive survey on security challenges in different network layers in cloud computing | |
US12003485B2 (en) | Outbound/inbound lateral traffic punting based on process risk | |
Shaghaghi et al. | Software-defined network (SDN) data plane security: issues, solutions, and future directions | |
Jimenez et al. | A survey of the main security issues and solutions for the SDN architecture | |
Sallam et al. | On the security of SDN: A completed secure and scalable framework using the software-defined perimeter | |
JP6106780B2 (en) | Malware analysis system | |
US20230247003A1 (en) | Zero trust private application access for government applications | |
US12309144B2 (en) | Utilizing endpoint security posture, identification, and remote attestation for restricting private application access | |
US10560434B2 (en) | Automated honeypot provisioning system | |
US10855656B2 (en) | Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation | |
Reynaud et al. | Attacks against network functions virtualization and software-defined networking: State-of-the-art | |
Karmakar et al. | Mitigating attacks in software defined networks | |
Arbettu et al. | Security analysis of OpenDaylight, ONOS, Rosemary and Ryu SDN controllers | |
US20230019448A1 (en) | Predefined signatures for inspecting private application access | |
Bhuiyan et al. | On the (in) security of the control plane of sdn architecture: A survey | |
Thimmaraju et al. | Outsmarting network security with SDN teleportation | |
Chen et al. | Survey on software-defined networking | |
CN111295640B (en) | Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation | |
Belmonte Martin et al. | Threat landscape and good practice guide for software defined networks/5g | |
Schwarz | TrustedGateway: TEE-assisted routing and firewall enforcement using ARM TrustZone | |
Berger et al. | Security intelligence for cloud management infrastructures | |
Tseng et al. | A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking | |
Combe et al. | An sdn and nfv use case: Ndn implementation and security monitoring | |
Gordeychik et al. | SD-WAN Threat Landscape |