2016
DOI: 10.1007/978-3-319-50011-9_35
|View full text |Cite
|
Sign up to set email alerts
|

Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…LLI measures the switch- internal link latency during all LLDP propagations and flags anomalies that could indicate a forged link. A similar approach was proposed by Wang et al [35]. However, in the study by [30], the author discovered an attack that allowed for the removal of genuine links between switches, taking advantage of how LLI works.…”
Section: Existing Solutions and Analysismentioning
confidence: 97%
“…LLI measures the switch- internal link latency during all LLDP propagations and flags anomalies that could indicate a forged link. A similar approach was proposed by Wang et al [35]. However, in the study by [30], the author discovered an attack that allowed for the removal of genuine links between switches, taking advantage of how LLI works.…”
Section: Existing Solutions and Analysismentioning
confidence: 97%
“…At the national level, some of the errors may be incorrect data entry. An attacker may make more elaborate attacks, such as an attack on communication channels [8,9], such as a MiTM (Man in the Middle) attack [10,11]. Attacks on the monitoring web, such as command injection [12], Distributed Denial of Service (DDoS) [13,14], Cross Site Scripting (XSS) [15,16].…”
Section: Possible Errors and Attacks On The Systemmentioning
confidence: 99%