2017 IEEE 6th International Conference on Cloud Networking (CloudNet) 2017
DOI: 10.1109/cloudnet.2017.8071526
|View full text |Cite
|
Sign up to set email alerts
|

Track: Tracerouting in SDN networks with arbitrary network functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…18. With 100% detection rate, SDN-RDCD [22] shows an impressive results with 100% accuracy, while Generic [10] has 98%, Track [17] has more than 95.08% and FlowMon [19] has 77% accuracy. From the comparison, we can see that our mechanism is effective in detecting middleboxbypass attacks and compromised switches.…”
Section: B2 Results Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…18. With 100% detection rate, SDN-RDCD [22] shows an impressive results with 100% accuracy, while Generic [10] has 98%, Track [17] has more than 95.08% and FlowMon [19] has 77% accuracy. From the comparison, we can see that our mechanism is effective in detecting middleboxbypass attacks and compromised switches.…”
Section: B2 Results Evaluationmentioning
confidence: 99%
“…N.Y. Vijayvergiya [16] proposed several algorithms to determine the compromised switch and the collaboration between them. Y. Zhang [17] presents a novel troubleshooting tool that can discover the forwarding path taken by any packets. However, the probe-based method can be disabled if compromised switches can recognize the probe packets and forward them as commanded.…”
Section: A Compromised Switch Attacksmentioning
confidence: 99%
“…Such operations must be able to be easily implemented by all federation members. We have previously studied verification and validation of service chaining in SDN environment [14]. Our experience suggests that, for FSC, a more feasible approach is to create a passive probing (black-box) scheme that is less intrusive.…”
Section: B Fsc Validation and Verificationmentioning
confidence: 99%