2015 IEEE Conference on Communications and Network Security (CNS) 2015
DOI: 10.1109/cns.2015.7346918
|View full text |Cite
|
Sign up to set email alerts
|

Towards an SDN-enabled IDS environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…A software-defined approach to secure field zones in an ICS is shown in [15]. The implementation of IDS within SDN controllers is proposed in [16], [17], [18], and [19] that provides a survey on SDN based network intrusion detection systems based on machine learning approaches. Few papers measure the impact of an IDS implemented over SDN architectures: [20] presents a QoS comparison of two open source network intrusion detection systems (Snort IDS and Bro IDS) in a SDN architecture.…”
Section: Related Workmentioning
confidence: 99%
“…A software-defined approach to secure field zones in an ICS is shown in [15]. The implementation of IDS within SDN controllers is proposed in [16], [17], [18], and [19] that provides a survey on SDN based network intrusion detection systems based on machine learning approaches. Few papers measure the impact of an IDS implemented over SDN architectures: [20] presents a QoS comparison of two open source network intrusion detection systems (Snort IDS and Bro IDS) in a SDN architecture.…”
Section: Related Workmentioning
confidence: 99%
“…can be deployed as virtual components of a cloud infarastructure orchestrated through the SDN control mechanisms for proper operations, and exploiting NFV for lifecycle management. [Melis et al 2018;Seeber et al 2015] Finally, they can be combined with a forwarding plane that can be also integrated in the virtualized environment, for instance by exploiting OpenVswitch (OVS), which is now tightly integrated with various cloud platforms, including OpenStack, openQRM, Open-Nebula and oVirt [Wen et al 2012].…”
Section: Technologies and State Of The Art 21 Sdn And Nfvmentioning
confidence: 99%
“…The controller creates flow rules within switches that allow/deny that flow's packets within the network (self-protecting). Also, network operators can configure those switches to behave similarly to mini-firewalls and may steer specific type of traffic to another system (i.e., such as IDS) either for more inspection [68] or detection of possible threats [69]- [72]. Many SDN controllers already implement firewall application within their distribution such as in OpenDaylight and Floodlight controllers.…”
Section: A Autonomy Of Sdnmentioning
confidence: 99%