$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[해외논문] SDN-based cyber defense: A survey

Future generation computer systems : FGCS, v.115, 2021년, pp.126 - 149  

Yurekten, Ozgur (Department of Computer Engineering, Gazi University) ,  Demirci, Mehmet (Department of Computer Engineering, Gazi University)

Abstract AI-Helper 아이콘AI-Helper

Abstract The growth and ubiquity of the Internet have changed the world in numerous ways, one of which is giving rise to the necessity of being vigilant about information security and cyber threats. As threat actors have become more sophisticated and new threats are emerging constantly, meeting inf...

Keyword

참고문헌 (150)

  1. McAfeeLabs 35 2019 Threats Report, August 2019 

  2. Kaspersky 6 2019 Kaspersky Security Bulletin 2019, Statistics 

  3. IEEE Comput. Kolias 50 7 80 2017 10.1109/MC.2017.201 DDoS in the IoT: Mirai and other Botnets 

  4. J. Netw. Comput. Appl. Masoudi 67 1 2016 10.1016/j.jnca.2016.03.016 Software defined networks: A survey 

  5. Proc. IEEE Kreutz 103 1 14 2015 10.1109/JPROC.2014.2371999 Software-defined networking: A comprehensive survey 

  6. ACM SIGCOMM Comput. Commun. Rev. McKeown 38 2 69 2008 10.1145/1355734.1355746 Openflow: Enabling innovation in campus networks 

  7. Comput. Secur. Qamar 67 35 2017 10.1016/j.cose.2017.02.005 Data-driven analytics for cyber-threat intelligence and information sharing 

  8. 2020 STIX 2.1 specification 

  9. 2014 RFC 5070 - IODEF (the incident object description exchange format) 

  10. 2019 OpenIoC 

  11. IEEE Secur. Priv. Dacier 15 2 96 2017 10.1109/MSP.2017.46 Security challenges and opportunities of software-defined networking 

  12. Kurniawan 39 2019 Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering A systematic literature review of security software defined network: Research trends, threat, attack, detect, mitigate, and countermeasure 

  13. Comput. Secur. Alsmadi 53 79 2015 10.1016/j.cose.2015.05.006 Security of software defined networks: A survey 

  14. IEEE Commun. Surv. Tutor. Ahmad 17 4 2317 2015 10.1109/COMST.2015.2474118 Security in software defined networks: A survey 

  15. IEEE Commun. Surv. Tutor. Scott-Hayward 18 1 623 2016 10.1109/COMST.2015.2453114 A survey of security in software defined networks 

  16. Achleitner 57 2016 8th ACM CCS International Workshop on Managing Insider Security Threats Cyber deception: Virtual networks to defend insider reconnaissance 

  17. Shaghaghi 341 2020 Handbook of Computer Networks and Cyber Security Software-defined network (SDN) data plane security: Issues, solutions, and future directions 

  18. IEEE Commun. Surv. Tutor. Rawat 19 1 325 2017 10.1109/COMST.2016.2618874 Software defined networking architecture, security and energy efficiency: A survey 

  19. J. Netw. Comput. Appl. Chica 159 102595 1 2020 Security in SDN: A comprehensive survey 

  20. IEEE Commun. Surv. Tutor. Farris 21 1 812 2019 10.1109/COMST.2018.2862350 A survey on emerging SDN and NFV security mechanisms for IoT systems 

  21. ACM Comput. Surv. Swami 52 2 1 2019 10.1145/3301614 Software-defined networking-based DDoS defense mechanisms 

  22. Int. J. Intell. Counter Intell. Jasper 30 1 53 2017 U.S. cyber threat intelligence sharing frameworks 

  23. 2020 TAXII v2.1 specification 

  24. Barnum 2012 The CybOX Language Specification 

  25. Rhoades 1 2014 International Carnahan Conference on Security Technology Machine actionable indicators of compromise 

  26. Asgarli 1 2016 IEEE Symposium on Technologies for Homeland Security Semantic ontologies for cyber threat sharing standards 

  27. IEEE Commun. Surv. Tutor. Mijumbi 18 1 236 2016 10.1109/COMST.2015.2477041 Network function virtualization: State-of-the-art and research challenges 

  28. J. Netw. Comput. Appl. Cui 68 65 2016 10.1016/j.jnca.2016.04.005 SD-anti-DDoS: Fast and efficient DDoS defense in software-defined networks 

  29. Mob. Netw. Appl. Shu 21 5 764 2016 10.1007/s11036-016-0676-x Security in software-defined networking: Threats and countermeasures 

  30. Front. Inf. Technol. Electron. Eng. Wang 19 12 1500 2018 10.1631/FITEE.1800575 Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey 

  31. Concurr. Comput.: Pract. Exper. Han 2019 A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers 

  32. Photonic Netw. Commun. Benabbou 37 1 1 2019 10.1007/s11107-018-0803-7 Security in OpenFlow-based SDN, opportunities and challenges 

  33. Thimmaraju 1 2018 Proceedings of the Symposium on SDN Research Taking control of sdn-based cloud systems via the data plane 

  34. Achleitner 8 2017 Proceedings of the Symposium on SDN Research Adversarial network forensics in software defined networking 

  35. Ghosh 79 2018 Cyber-Physical Systems for Next-Generation Networks Securing SDN-enabled smart power grids: SDN-enabled smart grid security 

  36. Demirci 1021 2018 2018 7th International Conference on Renewable Energy Research and Applications Software-defined networking for improving security in smart grid systems 

  37. Trans. Emerg. Telecommun. Technol. Petroulakis 29 7 2018 Reactive security for SDN/NFV-enabled industrial networks leveraging service function chaining 

  38. 2016 STIX 1.2.1 specification 

  39. Sethi 2013 Introduction to attack patterns 

  40. 2017 Common attack pattern enumeration and classification (CAPEC) 

  41. 2020 MITRE adversarial tactics, techniques, and common knowledge (MITRE ATT&CK) 

  42. Int. J. Inf. Secur. Sci. Canbek 5 4 106 2016 New comprehensive taxonomies on mobile security and malware analysis 

  43. Comput. Secur. Hansman 24 31 2005 10.1016/j.cose.2004.06.011 A taxonomy of network and computer attacks 

  44. Jin 1171 2009 IEEE International Conference on Systems, Man, and Cybernetics A review of classification methods for network vulnerability 

  45. Simmons 2 2014 9th Annual Symposium on Information Assurance AVOIDIT: A cyber attack taxonomy 

  46. Defensive Cyber Secur.: Process. Policies Amer 13 2 22 2010 Intrusion detection systems (IDS) taxonomy - a short review 

  47. Lough 2001 A Taxonomy of Computer Attacks with Applications to Wireless Networks 

  48. NTT Security 7 2019 Global Threat Intelligence Report 

  49. Neely 5 2017 SANS 2017 Threat Landscape Survey: Users on the Front Line 

  50. Symantec 2017 Internet Security Threat Report 

  51. Wu 26 2011 International Conference of Information Technology, Computer Engineering and Management Sciences A taxonomy of network and computer attacks based on responses 

  52. Comput. Secur. Kjaerland 25 522 2006 10.1016/j.cose.2006.08.004 A taxonomy and comparison of computer security incidents from the commercial and government sectors 

  53. Comput. Stand. Interfaces Uzunov 36 4 734 2014 10.1016/j.csi.2013.12.008 An extensible pattern-based library and taxonomy of security threats for distributed systems 

  54. J. Netw. Comput. Appl. Hoque 40 307 2014 10.1016/j.jnca.2013.08.001 Network attacks: Taxonomy, tools and systems 

  55. Fu 267 2016 12th International Conference on Computational Intelligence and Security A security threats taxonomy for routing system intrusion detection 

  56. McAfee 60 2017 Threats Report, September 2017 

  57. IEEE Trans. Netw. Serv. Manag. Achleitner 14 4 1098 2017 10.1109/TNSM.2017.2724239 Deceiving network reconnaissance using SDN-based virtual topologies 

  58. Chiang 800 2016 IEEE Military Communications Conference ACyDS: An adaptive cyber deception system 

  59. Robertson 114 2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops CINDAM: Customized information networks for deception and attack mitigation 

  60. Jafarian 127 2012 First Workshop on Hot Topics in Software Defined Networks Openflow random host mutation: Transparent moving target defense using software defined networking 

  61. Jafarian 69 2014 First ACM Workshop on Moving Target Defense Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers 

  62. IEEE Trans. Inf. Forensics Secur. Jafarian 10 12 2562 2015 10.1109/TIFS.2015.2467358 An effective address mutation approach for disrupting reconnaissance attacks 

  63. Jafarian 738 2015 IEEE Conference on Computer Communications Adversary-aware IP address randomization for proactive agility against sophisticated attackers 

  64. Ma 39 2016 10.1007/978-3-319-50011-9_4 Lecture Notes in Computer Science, Vol. 9977 A self-adaptive hopping approach of moving target defense to thwart scanning attacks 

  65. Macfarland 37 2015 2nd ACM Workshop on Moving Target Defense The SDN shuffle: Creating a moving-target defense using host-based software-defined networking 

  66. PLoS One Wang 12 5 1 2017 Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks 

  67. Lecture Notes in Comput. Sci. Wang 9866 203 2016 10.1007/978-3-319-45871-7_13 Moving target defense against network reconnaissance with software defined networking 

  68. Secur. Commun. Netw. Zhao 2017 1 2017 An SDN-based fingerprint hopping method to prevent fingerprinting attacks 

  69. Kampanakis 1 2014 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks SDN-based solutions for moving target defense network protection 

  70. Shin 1 2013 Network and Distributed System Security Symposium FRESCO: Modular composable security services for software-defined networks 

  71. Cabaj 1 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security SDN-Based mitigation of scanning attacks for the 5g internet of radio light system 

  72. Int. J. Comput. Sci. Netw. Secur. Sahri 16 6 125 2016 Cauth-protecting DNS application from spoofing attacks 

  73. Sahri 83 2016 11th International Conference on Future Internet Technologies Protecting DNS services from IP spoofing: SDN collaborative authentication approach 

  74. Sahri 565 2016 IEEE 40th Annual Computer Software and Applications Conference Collaborative spoofing detection and mitigation-SDN based looping authentication for DNS services 

  75. Masoud 1 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies On preventing ARP poisoning attack utilizing software defined network (SDN) paradigm 

  76. Cox 1 2016 SoutheastCon 2016 Leveraging SDN for ARP security 

  77. Nehra 1 2017 IEEE 7th Annual Computing and Communication Workshop and Conference FICUR: Employing SDN programmability to secure ARP 

  78. Int. J. Adv. Comput. Sci. Appl. Ubaid 8 4 562 2017 Mitigating address spoofing attacks in hybrid SDN 

  79. Alharbi 523 2016 IEEE 41st Conference on Local Computer Networks Securing ARP in software defined networks 

  80. Secur. Commun. Netw. Lu 2017 1 2017 An SDN-based authentication mechanism for securing neighbor discovery protocol in ipv6 

  81. Ann. Telecommun. Mattos 71 11-12 607 2016 10.1007/s12243-016-0505-z AuthFlow: authentication and access control mechanism for software defined networking 

  82. Kuliesius 894 2016 Eighth International Conference on Ubiquitous and Future Networks SDN enhanced campus network authentication and access control system 

  83. Comput. Commun. Kwon 64 1 2015 10.1016/j.comcom.2015.03.003 An incrementally deployable anti-spoofing mechanism for software-defined networks 

  84. Liu 595 2016 ACM SIGCOMM Conference Source address validation in software defined networks 

  85. Yao 7 2011 International Conference on Network Protocols Source address validation solution with openflow/NOX architecture 

  86. Yao 1 2014 International Conference on Computer Communications and Networks Performing software defined route-based IP spoofing filtering with SEFA 

  87. Jafarian 237 2013 10.1007/978-3-642-40203-6_14 Lecture Notes in Computer Science, Vol. 8134 Formal approach for route agility against persistent attackers 

  88. Gillani 729 2015 IEEE Conference on Computer Communications Agile virtualized infrastructure to proactively defend against cyber attacks 

  89. Comput. Netw. Fichera 92 89 2015 10.1016/j.comnet.2015.08.038 OPERETTA: An openflow-based remedy to mitigate TCP SYNFLOOD attacks against web servers 

  90. Shin 413 2013 ACM SIGSAC Conference on Computer and Communications Security AVANT-GUARD: Scalable and vigilant switch flow management in software-defined networks 

  91. Comput. Netw. Giotis 62 122 2014 10.1016/j.bjp.2013.10.014 Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments 

  92. Hussein 54 2016 IEEE International Conference on Cloud Engineering Workshop SDN security plane: An architecture for resilient security services 

  93. Comput. Netw. Joldzic 104 27 2016 10.1016/j.comnet.2016.05.004 A transparent and scalable anomaly-based dos detection method 

  94. ACM SIGCOMM Comput. Commun. Rev. Li 44 4 591 2014 10.1145/2740070.2631469 Drawbridge-software-defined DDoS-resistant traffic engineering 

  95. ACM SIGCOMM Comput. Commun. Rev. Miao 44 121 2014 10.1145/2740070.2631446 NIMBUS: Cloud-scale attack detection and mitigation 

  96. Oktian 325 2014 International Conference on Information and Communication Technology Convergence Mitigating denial of service (DoS) attacks in openflow networks 

  97. Piedrahita 1 2015 Global Information Infrastructure and Networking Symposium Flowfence: A denial of service defense system for software defined networking 

  98. Secur. Commun. Netw. Wang 2018 2018 SDNManager: A safeguard architecture for SDN DoS attacks based on bandwidth prediction 

  99. Comput. Netw. Wang 81 308 2015 10.1016/j.comnet.2015.02.026 DDoS attack protection in the era of cloud computing and software-defined networking 

  100. Shang 1 2017 INFOCOM 2017-IEEE Conference on Computer Communications, IEEE Flooddefender: Protecting data and control plane resources under SDN-aimed DoS attacks 

  101. Wang 1 2018 NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium SECOD: SDN secure control and data plane algorithm for detecting and defending against DoS attacks 

  102. Goksel 1 2019 International Symposium on Networks, Computers and Communications Dos attack detection using packet statistics in SDN 

  103. Xie 1 2019 ICC 2019-2019 IEEE International Conference on Communications Softguard: Defend against the low-rate TCP attack in SDN 

  104. Wang 397 2016 IEEE Symposium on Computers and Communication Towards mitigating link flooding attack via incremental SDN deployment 

  105. IEEE Trans. Dependable Secure Comput. Wang 16 6 944 2019 10.1109/TDSC.2018.2822275 Detecting and mitigating target link-flooding attacks using SDN 

  106. IEEE Trans. Inf. Forensics Secur. Zheng 13 7 1838 2018 10.1109/TIFS.2018.2805600 Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis 

  107. Int. J. Commun. Syst. Li 31 5 2018 10.1002/dac.3497 Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN 

  108. Cui 649 2018 Australasian Conference on Information Security and Privacy TDDAD: Time-based detection and defense scheme against DDoS attack on SDN controller 

  109. IEEE Access El Houda 7 98893 2019 10.1109/ACCESS.2019.2930715 Cochain-SC: An intra-and inter-domain ddos mitigation scheme based on blockchain using SDN and smart contract 

  110. Rodrigues 16 2017 IFIP International Conference on Autonomous Infrastructure, Management and Security A blockchain-based architecture for collaborative DDoS mitigation with smart contracts 

  111. Abou El Houda 1 2019 2019 IEEE Global Communications Conference Co-IoT: A collaborative ddos mitigation scheme in IoT environment based on blockchain using SDN 

  112. 10.1145/3365609.3365860 J. Xing, W. Wu, A. Chen, Architecting programmable data plane defenses into the network with fastflex, in: Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019, pp. 161-169. 

  113. 10.14722/ndss.2020.24007 M. Zhang, G. Li, S. Wang, C. Liu, A. Chen, H. Hu, G. Gu, Q. Li, M. Xu, J. Wu, Poseidon: Mitigating volumetric DDoS attacks with programmable switches, in: Proceedings of NDSS, 2020. 

  114. 2020 SFlow 

  115. Kang 127 2013 Security and Privacy (SP), 2013 IEEE Symposium on The crossfire attack 

  116. 2020 Project floodlight 

  117. Secur. Priv. Singh 3 3 2020 Utilization of blockchain for mitigating the distributed denial of service attacks 

  118. Math. Probl. Eng. Zhao 2016 1 2016 SDN-based double hopping communication against sniffer attack 

  119. Duan 260 2013 IEEE Conference on Communications and Network Security Efficient random route mutation considering flow and network constraints 

  120. IEICE Trans. Inf. Syst. Liu E100D 5 1046 2017 10.1587/transinf.2016EDP7377 A defense mechanism of random routing mutation in SDN 

  121. Furukawa 1 2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies Highly secure communication service architecture using SDN switch 

  122. Ma 1 2016 IEEE 35th International Performance Computing and Communications Conference Thwart eavesdropping attacks on network communication based on moving target defense 

  123. Germano Da Silva 165 2015 IFIP/IEEE International Symposium on Integrated Network Management Capitalizing on SDN-based SCADA systems: An anti-eavesdropping case-study 

  124. Villain 413 2014 IEEE 3rd International Conference on Cloud Networking Mutualized openflow architecture for network access management 

  125. IEEE Netw. Cabaj 30 6 14 2016 10.1109/MNET.2016.1600110NM Using software-defined networking for ransomware mitigation: The case of cryptowall 

  126. Ceron 525 2016 IEEE Symposium on Computers and Communication MARS: An SDN-based malware analysis solution 

  127. KSII Trans. Internet Inf. Syst. Hu 11 1 484 2017 WORM-HUNTER: A worm guard system using software-defined networking 

  128. Jin 81 2013 Second GENI Research and Educational Experiment Workshop Malware detection for mobile devices using software-defined networking 

  129. Masoud 1 2016 2nd International Conference on Open Source Software Computing On tackling social engineering web phishing attacks utilizing software defined networks (SDN) approach 

  130. IEEE Access Chin 6 42516 2018 10.1109/ACCESS.2018.2837889 Phishlimiter: a phishing detection and mitigation approach using software-defined networking 

  131. Lim 63 2014 6th International Conference on Ubiquitous and Future Networks A SDN-oriented DDoS blocking scheme for botnet-based attacks 

  132. Shtern 604 2014 IEEE International Conference on Cloud Engineering Towards mitigation of low and slow application ddos attacks 

  133. Yurekten 377 2017 2017 International Conference on Computer Science and Engineering Using cyber threat intelligence in SDN security 

  134. Wirel. Commun. Mob. Comput. Bakhshi 2017 2017 10.1155/2017/7191647 State of the art and recent research advances in software defined networking 

  135. 2020 The POX network software platform 

  136. ACM SIGCOMM Comput. Commun. Rev. Gude 38 3 105 2008 10.1145/1384609.1384625 NOX: towards an operating system for networks 

  137. 2020 Ryu SDN framework 

  138. 2020 Mininet: An instant virtual network on your laptop (or other PC) 

  139. 2020 Open vswitch 

  140. IET Inf. Secur. Hu 11 6 345 2017 10.1049/iet-ifs.2017.0085 MNOS: a mimic network operating system for software defined networks 

  141. IEEE Commun. Mag. Sharma 55 9 78 2017 10.1109/MCOM.2017.1700041 Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks 

  142. IEEE Internet Things J. Yang 7 3 1667 2019 10.1109/JIOT.2019.2961187 Blockchain-based hierarchical trust networking for jointcloud 

  143. Future Gener. Comput. Syst. Sharma 86 650 2018 10.1016/j.future.2018.04.060 Blockchain based hybrid network architecture for the smart city 

  144. IEEE Trans. Ind. Inf. Yang 2020 Distributed blockchain-based trusted multi-domain collaboration for mobile edge computing in 5G and beyond 

  145. IEEE Access Xie 7 56656 2019 10.1109/ACCESS.2019.2913682 Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G-VANETs 

  146. China Commun. Yang 16 6 42 2019 10.23919/JCC.2019.06.004 Blockchain-based secure distributed control for software defined optical networking 

  147. IEEE Commun. Surv. Tutor. Ali 21 2 1676 2018 10.1109/COMST.2018.2886932 Applications of blockchains in the Internet of Things: A comprehensive survey 

  148. Trans. Emerg. Telecommun. Technol. Pohrmen 30 10 2019 Blockchain-based security aspects in heterogeneous Internet-of-Things networks: A survey 

  149. IEEE Network Praveen 2020 10.1109/MNET.001.2000005 Blockchain for 5G: A prelude to future telecommunication 

  150. IEEE Trans. Dependable Secure Comput. Connell 2018 Performance modeling of moving target defenses with reconfiguration limits 

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 논문

해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

관련 콘텐츠

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로