Nothing Special   »   [go: up one dir, main page]

Abdelrahman et al., 2021 - Google Patents

Software‐defined networking security for private data center networks and clouds: vulnerabilities, attacks, countermeasures, and solutions

Abdelrahman et al., 2021

View PDF
Document ID
7016285415927169368
Author
Abdelrahman A
Rodrigues J
Mahmoud M
Saleem K
Das A
Korotaev V
Kozlov S
Publication year
Publication venue
International Journal of Communication Systems

External Links

Snippet

Software‐defined networking (SDN) is an agile, modern networking approach that facilitates innovations in the networking paradigm. The abstracted and centralized network operating system facilitates the network management and reduces operational expenditure (OPEX) …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/08Configuration management of network or network elements
    • H04L41/0803Configuration setting of network or network elements
    • H04L41/0813Changing of configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources

Similar Documents

Publication Publication Date Title
Abdelrahman et al. Software‐defined networking security for private data center networks and clouds: vulnerabilities, attacks, countermeasures, and solutions
Jangjou et al. A comprehensive survey on security challenges in different network layers in cloud computing
US12003485B2 (en) Outbound/inbound lateral traffic punting based on process risk
Shaghaghi et al. Software-defined network (SDN) data plane security: issues, solutions, and future directions
Jimenez et al. A survey of the main security issues and solutions for the SDN architecture
Sallam et al. On the security of SDN: A completed secure and scalable framework using the software-defined perimeter
JP6106780B2 (en) Malware analysis system
US20230247003A1 (en) Zero trust private application access for government applications
US12309144B2 (en) Utilizing endpoint security posture, identification, and remote attestation for restricting private application access
US10560434B2 (en) Automated honeypot provisioning system
US10855656B2 (en) Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation
Reynaud et al. Attacks against network functions virtualization and software-defined networking: State-of-the-art
Karmakar et al. Mitigating attacks in software defined networks
Arbettu et al. Security analysis of OpenDaylight, ONOS, Rosemary and Ryu SDN controllers
US20230019448A1 (en) Predefined signatures for inspecting private application access
Bhuiyan et al. On the (in) security of the control plane of sdn architecture: A survey
Thimmaraju et al. Outsmarting network security with SDN teleportation
Chen et al. Survey on software-defined networking
CN111295640B (en) Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation
Belmonte Martin et al. Threat landscape and good practice guide for software defined networks/5g
Schwarz TrustedGateway: TEE-assisted routing and firewall enforcement using ARM TrustZone
Berger et al. Security intelligence for cloud management infrastructures
Tseng et al. A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking
Combe et al. An sdn and nfv use case: Ndn implementation and security monitoring
Gordeychik et al. SD-WAN Threat Landscape