2019 6th NAFOSTED Conference on Information and Computer Science (NICS) 2019
DOI: 10.1109/nics48868.2019.9023852
|View full text |Cite
|
Sign up to set email alerts
|

SDNLog-Foren: Ensuring the Integrity and Tamper Resistance of Log Files for SDN Forensics using Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
6

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 15 publications
0
9
0
6
Order By: Relevance
“…Additionally, given the high transactional nature of SDN, due to the decoupling of the layers, there is a problem with the storage of logs, which has an impact on network resources [212]. Noting both the difficulty of log preservation and log manipulation, new solutions for SDN have been proposed [213], [214]. However, it is still necessary to collect evidence of its performance in real environments with a higher number of transactions.…”
Section: ) Forensic Analysismentioning
confidence: 99%
“…Additionally, given the high transactional nature of SDN, due to the decoupling of the layers, there is a problem with the storage of logs, which has an impact on network resources [212]. Noting both the difficulty of log preservation and log manipulation, new solutions for SDN have been proposed [213], [214]. However, it is still necessary to collect evidence of its performance in real environments with a higher number of transactions.…”
Section: ) Forensic Analysismentioning
confidence: 99%
“…Alguns sobre os mecanismos de autenticação (Tang, Liu, He, Yu, & Qin, 2019), outros lidam com pontos de falha (Aydeger, Saputro, & Akkaya, 2019), ataques de negação de serviços (Abdullaziz, Wang, & Chen, 2019). A pesquisa dos diversos pontos críticos da segurança em redes SDN contribui para entender como a computação forense pode buscar evidências e elucidar, da melhor maneira possível, os incidentes de segurança (Duy, et al, 2019).…”
Section: Segurança Em Sdnunclassified
“…Quando se compara a análise de logs, nas redes tradicionais esses dados são coletados em diversos dispositivos da rede, por exemplo, firewalls, roteadores, sistemas de detecção de intrusão e outros sistemas da rede que armazenam essas informações. No SDN o controlador é logicamente centralizado permitindo o rastreamento de cada host e o monitoramento de fluxo da rede, informações necessárias para determinar a causa raiz do ataque (Duy, et al, 2019) (Achleitner, Porta, Jaeger, & McDaniel, 2017).…”
Section: Computação Forense Em Sdnunclassified
See 2 more Smart Citations