2019
DOI: 10.1016/j.future.2018.11.045
|View full text |Cite
|
Sign up to set email alerts
|

A moving target defense and network forensics framework for ISP networks using SDN and NFV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(33 citation statements)
references
References 14 publications
0
31
0
2
Order By: Relevance
“…Aydeger et al [13] proposed an SDN-based route mutation technique to deal with DDoS attacks which are validated via the implementation on the Mininet emulator with a Floodlight SDN controller. Further, Aydeger et al [14] defined a route mutation MTD technique for the Internet Service Provider (ISP) network context through NFV and virtual shadows network aiming to thwart possible DDoS attack. Their route mutation method makes it difficult for the attackers to perform attack reconnaissance phase and obtain network topology information.…”
Section: Emulation Model-based Mtd Evaluationmentioning
confidence: 99%
“…Aydeger et al [13] proposed an SDN-based route mutation technique to deal with DDoS attacks which are validated via the implementation on the Mininet emulator with a Floodlight SDN controller. Further, Aydeger et al [14] defined a route mutation MTD technique for the Internet Service Provider (ISP) network context through NFV and virtual shadows network aiming to thwart possible DDoS attack. Their route mutation method makes it difficult for the attackers to perform attack reconnaissance phase and obtain network topology information.…”
Section: Emulation Model-based Mtd Evaluationmentioning
confidence: 99%
“…Regarding MTD research, Aydeger et al [9] analyzed crossfire attack planning and utilized the analyzed results to develop the defense mechanism that in turn reorganizes the routes in such a way that the congested links are avoided during packet forwarding. In addition, for use when implementing MTD mechanisms via route mutation, Aydeger et al [10] proposed various virtual shadow networks created through network functions virtualization (NFV), which can dynamically change the routes for specific reconnaissance packets so that attackers will not be able to easily identify the actual network topologies. Zeitz et al [11] explored the uses of a micromoving target IPv6 defense (µMT6D).…”
Section: Related Workmentioning
confidence: 99%
“…It exploits OpenFlow to provide virtual IP address to different nodes in the network using a predefined frequency. Aydeger et al [6] proposed a MTD framework using SDN and Network Function Virtualization (NFV). The main motivation of their work is to exploit the benefits of both SDN and NFV for MTD design along with forensic capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…It fundamentally decouples the network control plane from forwarding data plane [4]. In recent past, there is a trend to design MTD solutions using Software Defined Networking (SDN) [5][6][7][8]. SDN substantially enhance the utilization of resources in the network, provides simplified network management, reeducation in operating cost and provides opportunities for network innovation and evaluation.…”
Section: Introductionmentioning
confidence: 99%