4.7 Article

MystifY: A proactive Moving-Target Defense for a resilient SDN controller in Software Defined CPS

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

SD-CPC: SDN Controller Placement Camouflage based on Stochastic Game for Moving-target Defense

Mohamed Samir et al.

Summary: This paper introduces a new concept of Controller Placement Camouflage (CPC) to dynamically change the attack surface of SDN controllers for Moving-target Defense (MTD), combining Controller Placement Problem (CPP) with MTD. The reliance on Zero-Sum game and Bayesian Attack Graph for real-time risk assessment, and frequent shifting of SDN controller locations, provides a dynamic approach to network security.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

Attacking distributed software-defined networks by leveraging network state consistency

Dylan Smyth et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments

Shi Dong et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

On detecting compromised controller in software defined networks

N. Anand et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Hardware & Architecture

Software-defined networking in cyber-physical systems: A survey

Elias Molina et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Information Systems

PYGRID: A software development and assessment framework for grid-aware software defined networking

Mohamed Samir et al.

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT (2018)

Article Telecommunications

Reliable and Load Balance-Aware Multi-Controller Deployment in SDN

Tao Hu et al.

CHINA COMMUNICATIONS (2018)

Proceedings Paper Computer Science, Information Systems

Repoxy: Replication Proxy for Trustworthy SDN Controller Operation

Mohamed Azab et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Article Computer Science, Information Systems

Optimal Strategy Selection for Moving Target Defense Based on Markov Game

Cheng Lei et al.

IEEE ACCESS (2017)

Proceedings Paper Computer Science, Theory & Methods

A Security Framework for SDN-enabled Smart Power Grids

Uttam Ghosh et al.

2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Optimal Network Reconfiguration for Software Defined Networks using Shuffle-based Online MTD

Jin B. Hong et al.

2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS) (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Mitigating Crossfire Attacks using SDN-based Moving Target Defense

Abdullah Aydeger et al.

2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN) (2016)

Proceedings Paper Computer Science, Theory & Methods

SDN based scalable MTD solution in Cloud Network

Ankur Chowdhary et al.

MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE (2016)

Article Computer Science, Information Systems

Heuristic Approaches to the Controller Placement Problem in Large Scale SDN Networks

Stanislav Lange et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2015)

Article Computer Science, Information Systems

Heuristic Approaches to the Controller Placement Problem in Large Scale SDN Networks

Stanislav Lange et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2015)

Article Computer Science, Hardware & Architecture

Software defined networking: State of the art and research challenges

Manar Jammal et al.

COMPUTER NETWORKS (2014)

Article Computer Science, Information Systems

The Controller Placement Problem

Brandon Heller et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2012)

Article Computer Science, Information Systems

The Blind Man's Bluff Approach to Security Using IPv6

Matthew Dunlop et al.

IEEE SECURITY & PRIVACY (2012)

Article Computer Science, Information Systems

Creating a cyber moving target for critical infrastructure applications using platform diversity

Hamed Okhravi et al.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2012)

Editorial Material Computer Science, Information Systems

OpenFlow: Enabling innovation in campus networks

Nick McKeown et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2008)

Article Automation & Control Systems

Evolutionary algorithms in control systems engineering: a survey

PJ Fleming et al.

CONTROL ENGINEERING PRACTICE (2002)