Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking 2013
DOI: 10.1145/2491185.2491199
|View full text |Cite
|
Sign up to set email alerts
|

Towards secure and dependable software-defined networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
325
0
9

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 604 publications
(335 citation statements)
references
References 20 publications
1
325
0
9
Order By: Relevance
“…A number of related works have analysed the SDN or OpenFlow vulnerability and identified security threats (Eason et al, 2013;Kloti et al, 2013; ftp://ftp.tik.ee.ethz.ch/pub/students/2012-HS/MA-2012-20.pdf; Kreutz et al, 2013;Benton et al, 2013;Khurshid et al, 2012Khurshid et al, , 2013Jafarian et al, 2012;Kobayashia et al, 2012) and some of them also summarise general possible solutions to malicious attacks, such as FortNox and FRESCO (SDN Security Seminars, http://www.OpenFlowsec.org/SDN_SecuritySeminar_Feb2012.pdf; Porras et al, 2012;Shin et al, 2013aShin et al, , 2013b) that extends NOX (Gude et al, 2008) with a security kernel and security programming interface. Kreutz et al (2013) analysed and identified several threat vectors that may enable the exploiting of SDN vulnerabilities. They have summarised SDN security kernel work that was capable of ensuring prioritised switch flow rules for security related applications and for other all remaining applications.…”
Section: Related Workmentioning
confidence: 99%
“…A number of related works have analysed the SDN or OpenFlow vulnerability and identified security threats (Eason et al, 2013;Kloti et al, 2013; ftp://ftp.tik.ee.ethz.ch/pub/students/2012-HS/MA-2012-20.pdf; Kreutz et al, 2013;Benton et al, 2013;Khurshid et al, 2012Khurshid et al, , 2013Jafarian et al, 2012;Kobayashia et al, 2012) and some of them also summarise general possible solutions to malicious attacks, such as FortNox and FRESCO (SDN Security Seminars, http://www.OpenFlowsec.org/SDN_SecuritySeminar_Feb2012.pdf; Porras et al, 2012;Shin et al, 2013aShin et al, , 2013b) that extends NOX (Gude et al, 2008) with a security kernel and security programming interface. Kreutz et al (2013) analysed and identified several threat vectors that may enable the exploiting of SDN vulnerabilities. They have summarised SDN security kernel work that was capable of ensuring prioritised switch flow rules for security related applications and for other all remaining applications.…”
Section: Related Workmentioning
confidence: 99%
“…But SSL/TLS protocol is not enough to establish and assure trust between controllers and switches. Attacker can gains access to the control plane by exploit the weaknesses of SSL/TLS [7].…”
Section: Security Problems Of Flowmentioning
confidence: 99%
“…Other examples of middleboxes used to enhance security are presented by Anwer et al [69] and Fayazbakhsh et al [71]. In particular, Kreutz et al [64] present the vectors of the most common threats in SDN, such as DDoS attacks, and comment on the TLS chal -1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 lenges above.…”
Section: Securitymentioning
confidence: 99%