2016
DOI: 10.1016/j.jnca.2015.11.012
|View full text |Cite
|
Sign up to set email alerts
|

Secure and dependable software defined networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
56
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 103 publications
(58 citation statements)
references
References 94 publications
0
56
0
2
Order By: Relevance
“…1) SDN security: Security can be viewed as an assurance of data authenticity, integrity and confidentiality [12]. Security is one of the driving force of SDN due to the sharp rise in sophisticated attacks on the networks [16].…”
Section: B Sdn Security and Trustmentioning
confidence: 99%
See 3 more Smart Citations
“…1) SDN security: Security can be viewed as an assurance of data authenticity, integrity and confidentiality [12]. Security is one of the driving force of SDN due to the sharp rise in sophisticated attacks on the networks [16].…”
Section: B Sdn Security and Trustmentioning
confidence: 99%
“…Consequently, danger can be posed when a hacker exploit the network programmability to take over the control of the entire networks in which traffic can be rerouted or even duplicated to carry out unauthorized operations. In particular, the interaction between the SDN controller and the various applications (either user, third-party or network service applications [12][13] [19]) that runs atop the network infrastructure poses great risks. Applications like intrusion detection system could request the network to filter traffic or a MapReduce-style application could request bandwidth guarantees to improve performance [1] [12].…”
Section: B Sdn Security and Trustmentioning
confidence: 99%
See 2 more Smart Citations
“…Similarly, when we design a software, do not forget diverse security concerns (Akhunzada et al, 2015d, Akhunzada et al, 2015a to ensure that the software design supports penetration testing (ethical hacking) against hacking (Chang and Ramachandran, 2016).…”
Section: Introductionmentioning
confidence: 99%