최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Future generation computer systems : FGCS, v.115, 2021년, pp.126 - 149
Yurekten, Ozgur (Department of Computer Engineering, Gazi University) , Demirci, Mehmet (Department of Computer Engineering, Gazi University)
Abstract The growth and ubiquity of the Internet have changed the world in numerous ways, one of which is giving rise to the necessity of being vigilant about information security and cyber threats. As threat actors have become more sophisticated and new threats are emerging constantly, meeting inf...
McAfeeLabs 35 2019 Threats Report, August 2019
Kaspersky 6 2019 Kaspersky Security Bulletin 2019, Statistics
IEEE Comput. Kolias 50 7 80 2017 10.1109/MC.2017.201 DDoS in the IoT: Mirai and other Botnets
J. Netw. Comput. Appl. Masoudi 67 1 2016 10.1016/j.jnca.2016.03.016 Software defined networks: A survey
Proc. IEEE Kreutz 103 1 14 2015 10.1109/JPROC.2014.2371999 Software-defined networking: A comprehensive survey
ACM SIGCOMM Comput. Commun. Rev. McKeown 38 2 69 2008 10.1145/1355734.1355746 Openflow: Enabling innovation in campus networks
Comput. Secur. Qamar 67 35 2017 10.1016/j.cose.2017.02.005 Data-driven analytics for cyber-threat intelligence and information sharing
2020 STIX 2.1 specification
2014 RFC 5070 - IODEF (the incident object description exchange format)
2019 OpenIoC
IEEE Secur. Priv. Dacier 15 2 96 2017 10.1109/MSP.2017.46 Security challenges and opportunities of software-defined networking
Kurniawan 39 2019 Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering A systematic literature review of security software defined network: Research trends, threat, attack, detect, mitigate, and countermeasure
Comput. Secur. Alsmadi 53 79 2015 10.1016/j.cose.2015.05.006 Security of software defined networks: A survey
IEEE Commun. Surv. Tutor. Ahmad 17 4 2317 2015 10.1109/COMST.2015.2474118 Security in software defined networks: A survey
IEEE Commun. Surv. Tutor. Scott-Hayward 18 1 623 2016 10.1109/COMST.2015.2453114 A survey of security in software defined networks
Achleitner 57 2016 8th ACM CCS International Workshop on Managing Insider Security Threats Cyber deception: Virtual networks to defend insider reconnaissance
Shaghaghi 341 2020 Handbook of Computer Networks and Cyber Security Software-defined network (SDN) data plane security: Issues, solutions, and future directions
IEEE Commun. Surv. Tutor. Rawat 19 1 325 2017 10.1109/COMST.2016.2618874 Software defined networking architecture, security and energy efficiency: A survey
J. Netw. Comput. Appl. Chica 159 102595 1 2020 Security in SDN: A comprehensive survey
IEEE Commun. Surv. Tutor. Farris 21 1 812 2019 10.1109/COMST.2018.2862350 A survey on emerging SDN and NFV security mechanisms for IoT systems
ACM Comput. Surv. Swami 52 2 1 2019 10.1145/3301614 Software-defined networking-based DDoS defense mechanisms
Int. J. Intell. Counter Intell. Jasper 30 1 53 2017 U.S. cyber threat intelligence sharing frameworks
2020 TAXII v2.1 specification
Barnum 2012 The CybOX Language Specification
Rhoades 1 2014 International Carnahan Conference on Security Technology Machine actionable indicators of compromise
Asgarli 1 2016 IEEE Symposium on Technologies for Homeland Security Semantic ontologies for cyber threat sharing standards
IEEE Commun. Surv. Tutor. Mijumbi 18 1 236 2016 10.1109/COMST.2015.2477041 Network function virtualization: State-of-the-art and research challenges
J. Netw. Comput. Appl. Cui 68 65 2016 10.1016/j.jnca.2016.04.005 SD-anti-DDoS: Fast and efficient DDoS defense in software-defined networks
Mob. Netw. Appl. Shu 21 5 764 2016 10.1007/s11036-016-0676-x Security in software-defined networking: Threats and countermeasures
Front. Inf. Technol. Electron. Eng. Wang 19 12 1500 2018 10.1631/FITEE.1800575 Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey
Concurr. Comput.: Pract. Exper. Han 2019 A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers
Photonic Netw. Commun. Benabbou 37 1 1 2019 10.1007/s11107-018-0803-7 Security in OpenFlow-based SDN, opportunities and challenges
Thimmaraju 1 2018 Proceedings of the Symposium on SDN Research Taking control of sdn-based cloud systems via the data plane
Achleitner 8 2017 Proceedings of the Symposium on SDN Research Adversarial network forensics in software defined networking
Ghosh 79 2018 Cyber-Physical Systems for Next-Generation Networks Securing SDN-enabled smart power grids: SDN-enabled smart grid security
Demirci 1021 2018 2018 7th International Conference on Renewable Energy Research and Applications Software-defined networking for improving security in smart grid systems
Trans. Emerg. Telecommun. Technol. Petroulakis 29 7 2018 Reactive security for SDN/NFV-enabled industrial networks leveraging service function chaining
2016 STIX 1.2.1 specification
Sethi 2013 Introduction to attack patterns
2017 Common attack pattern enumeration and classification (CAPEC)
2020 MITRE adversarial tactics, techniques, and common knowledge (MITRE ATT&CK)
Int. J. Inf. Secur. Sci. Canbek 5 4 106 2016 New comprehensive taxonomies on mobile security and malware analysis
Comput. Secur. Hansman 24 31 2005 10.1016/j.cose.2004.06.011 A taxonomy of network and computer attacks
Jin 1171 2009 IEEE International Conference on Systems, Man, and Cybernetics A review of classification methods for network vulnerability
Simmons 2 2014 9th Annual Symposium on Information Assurance AVOIDIT: A cyber attack taxonomy
Defensive Cyber Secur.: Process. Policies Amer 13 2 22 2010 Intrusion detection systems (IDS) taxonomy - a short review
Lough 2001 A Taxonomy of Computer Attacks with Applications to Wireless Networks
NTT Security 7 2019 Global Threat Intelligence Report
Neely 5 2017 SANS 2017 Threat Landscape Survey: Users on the Front Line
Symantec 2017 Internet Security Threat Report
Wu 26 2011 International Conference of Information Technology, Computer Engineering and Management Sciences A taxonomy of network and computer attacks based on responses
Comput. Secur. Kjaerland 25 522 2006 10.1016/j.cose.2006.08.004 A taxonomy and comparison of computer security incidents from the commercial and government sectors
Comput. Stand. Interfaces Uzunov 36 4 734 2014 10.1016/j.csi.2013.12.008 An extensible pattern-based library and taxonomy of security threats for distributed systems
J. Netw. Comput. Appl. Hoque 40 307 2014 10.1016/j.jnca.2013.08.001 Network attacks: Taxonomy, tools and systems
Fu 267 2016 12th International Conference on Computational Intelligence and Security A security threats taxonomy for routing system intrusion detection
McAfee 60 2017 Threats Report, September 2017
IEEE Trans. Netw. Serv. Manag. Achleitner 14 4 1098 2017 10.1109/TNSM.2017.2724239 Deceiving network reconnaissance using SDN-based virtual topologies
Chiang 800 2016 IEEE Military Communications Conference ACyDS: An adaptive cyber deception system
Robertson 114 2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems Workshops CINDAM: Customized information networks for deception and attack mitigation
Jafarian 127 2012 First Workshop on Hot Topics in Software Defined Networks Openflow random host mutation: Transparent moving target defense using software defined networking
Jafarian 69 2014 First ACM Workshop on Moving Target Defense Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers
IEEE Trans. Inf. Forensics Secur. Jafarian 10 12 2562 2015 10.1109/TIFS.2015.2467358 An effective address mutation approach for disrupting reconnaissance attacks
Jafarian 738 2015 IEEE Conference on Computer Communications Adversary-aware IP address randomization for proactive agility against sophisticated attackers
Macfarland 37 2015 2nd ACM Workshop on Moving Target Defense The SDN shuffle: Creating a moving-target defense using host-based software-defined networking
PLoS One Wang 12 5 1 2017 Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks
Secur. Commun. Netw. Zhao 2017 1 2017 An SDN-based fingerprint hopping method to prevent fingerprinting attacks
Kampanakis 1 2014 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks SDN-based solutions for moving target defense network protection
Shin 1 2013 Network and Distributed System Security Symposium FRESCO: Modular composable security services for software-defined networks
Cabaj 1 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security SDN-Based mitigation of scanning attacks for the 5g internet of radio light system
Int. J. Comput. Sci. Netw. Secur. Sahri 16 6 125 2016 Cauth-protecting DNS application from spoofing attacks
Sahri 83 2016 11th International Conference on Future Internet Technologies Protecting DNS services from IP spoofing: SDN collaborative authentication approach
Sahri 565 2016 IEEE 40th Annual Computer Software and Applications Conference Collaborative spoofing detection and mitigation-SDN based looping authentication for DNS services
Masoud 1 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies On preventing ARP poisoning attack utilizing software defined network (SDN) paradigm
Cox 1 2016 SoutheastCon 2016 Leveraging SDN for ARP security
Nehra 1 2017 IEEE 7th Annual Computing and Communication Workshop and Conference FICUR: Employing SDN programmability to secure ARP
Int. J. Adv. Comput. Sci. Appl. Ubaid 8 4 562 2017 Mitigating address spoofing attacks in hybrid SDN
Alharbi 523 2016 IEEE 41st Conference on Local Computer Networks Securing ARP in software defined networks
Secur. Commun. Netw. Lu 2017 1 2017 An SDN-based authentication mechanism for securing neighbor discovery protocol in ipv6
Ann. Telecommun. Mattos 71 11-12 607 2016 10.1007/s12243-016-0505-z AuthFlow: authentication and access control mechanism for software defined networking
Kuliesius 894 2016 Eighth International Conference on Ubiquitous and Future Networks SDN enhanced campus network authentication and access control system
Comput. Commun. Kwon 64 1 2015 10.1016/j.comcom.2015.03.003 An incrementally deployable anti-spoofing mechanism for software-defined networks
Liu 595 2016 ACM SIGCOMM Conference Source address validation in software defined networks
Yao 7 2011 International Conference on Network Protocols Source address validation solution with openflow/NOX architecture
Yao 1 2014 International Conference on Computer Communications and Networks Performing software defined route-based IP spoofing filtering with SEFA
Gillani 729 2015 IEEE Conference on Computer Communications Agile virtualized infrastructure to proactively defend against cyber attacks
Comput. Netw. Fichera 92 89 2015 10.1016/j.comnet.2015.08.038 OPERETTA: An openflow-based remedy to mitigate TCP SYNFLOOD attacks against web servers
Shin 413 2013 ACM SIGSAC Conference on Computer and Communications Security AVANT-GUARD: Scalable and vigilant switch flow management in software-defined networks
Comput. Netw. Giotis 62 122 2014 10.1016/j.bjp.2013.10.014 Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
Hussein 54 2016 IEEE International Conference on Cloud Engineering Workshop SDN security plane: An architecture for resilient security services
Comput. Netw. Joldzic 104 27 2016 10.1016/j.comnet.2016.05.004 A transparent and scalable anomaly-based dos detection method
ACM SIGCOMM Comput. Commun. Rev. Li 44 4 591 2014 10.1145/2740070.2631469 Drawbridge-software-defined DDoS-resistant traffic engineering
ACM SIGCOMM Comput. Commun. Rev. Miao 44 121 2014 10.1145/2740070.2631446 NIMBUS: Cloud-scale attack detection and mitigation
Oktian 325 2014 International Conference on Information and Communication Technology Convergence Mitigating denial of service (DoS) attacks in openflow networks
Piedrahita 1 2015 Global Information Infrastructure and Networking Symposium Flowfence: A denial of service defense system for software defined networking
Secur. Commun. Netw. Wang 2018 2018 SDNManager: A safeguard architecture for SDN DoS attacks based on bandwidth prediction
Comput. Netw. Wang 81 308 2015 10.1016/j.comnet.2015.02.026 DDoS attack protection in the era of cloud computing and software-defined networking
Shang 1 2017 INFOCOM 2017-IEEE Conference on Computer Communications, IEEE Flooddefender: Protecting data and control plane resources under SDN-aimed DoS attacks
Wang 1 2018 NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium SECOD: SDN secure control and data plane algorithm for detecting and defending against DoS attacks
Goksel 1 2019 International Symposium on Networks, Computers and Communications Dos attack detection using packet statistics in SDN
Xie 1 2019 ICC 2019-2019 IEEE International Conference on Communications Softguard: Defend against the low-rate TCP attack in SDN
Wang 397 2016 IEEE Symposium on Computers and Communication Towards mitigating link flooding attack via incremental SDN deployment
IEEE Trans. Dependable Secure Comput. Wang 16 6 944 2019 10.1109/TDSC.2018.2822275 Detecting and mitigating target link-flooding attacks using SDN
IEEE Trans. Inf. Forensics Secur. Zheng 13 7 1838 2018 10.1109/TIFS.2018.2805600 Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis
Int. J. Commun. Syst. Li 31 5 2018 10.1002/dac.3497 Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN
Cui 649 2018 Australasian Conference on Information Security and Privacy TDDAD: Time-based detection and defense scheme against DDoS attack on SDN controller
IEEE Access El Houda 7 98893 2019 10.1109/ACCESS.2019.2930715 Cochain-SC: An intra-and inter-domain ddos mitigation scheme based on blockchain using SDN and smart contract
Rodrigues 16 2017 IFIP International Conference on Autonomous Infrastructure, Management and Security A blockchain-based architecture for collaborative DDoS mitigation with smart contracts
Abou El Houda 1 2019 2019 IEEE Global Communications Conference Co-IoT: A collaborative ddos mitigation scheme in IoT environment based on blockchain using SDN
2020 SFlow
Kang 127 2013 Security and Privacy (SP), 2013 IEEE Symposium on The crossfire attack
2020 Project floodlight
Secur. Priv. Singh 3 3 2020 Utilization of blockchain for mitigating the distributed denial of service attacks
Math. Probl. Eng. Zhao 2016 1 2016 SDN-based double hopping communication against sniffer attack
Duan 260 2013 IEEE Conference on Communications and Network Security Efficient random route mutation considering flow and network constraints
IEICE Trans. Inf. Syst. Liu E100D 5 1046 2017 10.1587/transinf.2016EDP7377 A defense mechanism of random routing mutation in SDN
Furukawa 1 2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies Highly secure communication service architecture using SDN switch
Ma 1 2016 IEEE 35th International Performance Computing and Communications Conference Thwart eavesdropping attacks on network communication based on moving target defense
Germano Da Silva 165 2015 IFIP/IEEE International Symposium on Integrated Network Management Capitalizing on SDN-based SCADA systems: An anti-eavesdropping case-study
Villain 413 2014 IEEE 3rd International Conference on Cloud Networking Mutualized openflow architecture for network access management
IEEE Netw. Cabaj 30 6 14 2016 10.1109/MNET.2016.1600110NM Using software-defined networking for ransomware mitigation: The case of cryptowall
Ceron 525 2016 IEEE Symposium on Computers and Communication MARS: An SDN-based malware analysis solution
KSII Trans. Internet Inf. Syst. Hu 11 1 484 2017 WORM-HUNTER: A worm guard system using software-defined networking
Jin 81 2013 Second GENI Research and Educational Experiment Workshop Malware detection for mobile devices using software-defined networking
Masoud 1 2016 2nd International Conference on Open Source Software Computing On tackling social engineering web phishing attacks utilizing software defined networks (SDN) approach
IEEE Access Chin 6 42516 2018 10.1109/ACCESS.2018.2837889 Phishlimiter: a phishing detection and mitigation approach using software-defined networking
Lim 63 2014 6th International Conference on Ubiquitous and Future Networks A SDN-oriented DDoS blocking scheme for botnet-based attacks
Shtern 604 2014 IEEE International Conference on Cloud Engineering Towards mitigation of low and slow application ddos attacks
Yurekten 377 2017 2017 International Conference on Computer Science and Engineering Using cyber threat intelligence in SDN security
Wirel. Commun. Mob. Comput. Bakhshi 2017 2017 10.1155/2017/7191647 State of the art and recent research advances in software defined networking
2020 The POX network software platform
ACM SIGCOMM Comput. Commun. Rev. Gude 38 3 105 2008 10.1145/1384609.1384625 NOX: towards an operating system for networks
2020 Ryu SDN framework
2020 Mininet: An instant virtual network on your laptop (or other PC)
2020 Open vswitch
IET Inf. Secur. Hu 11 6 345 2017 10.1049/iet-ifs.2017.0085 MNOS: a mimic network operating system for software defined networks
IEEE Commun. Mag. Sharma 55 9 78 2017 10.1109/MCOM.2017.1700041 Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks
IEEE Internet Things J. Yang 7 3 1667 2019 10.1109/JIOT.2019.2961187 Blockchain-based hierarchical trust networking for jointcloud
Future Gener. Comput. Syst. Sharma 86 650 2018 10.1016/j.future.2018.04.060 Blockchain based hybrid network architecture for the smart city
IEEE Trans. Ind. Inf. Yang 2020 Distributed blockchain-based trusted multi-domain collaboration for mobile edge computing in 5G and beyond
IEEE Access Xie 7 56656 2019 10.1109/ACCESS.2019.2913682 Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G-VANETs
China Commun. Yang 16 6 42 2019 10.23919/JCC.2019.06.004 Blockchain-based secure distributed control for software defined optical networking
IEEE Commun. Surv. Tutor. Ali 21 2 1676 2018 10.1109/COMST.2018.2886932 Applications of blockchains in the Internet of Things: A comprehensive survey
Trans. Emerg. Telecommun. Technol. Pohrmen 30 10 2019 Blockchain-based security aspects in heterogeneous Internet-of-Things networks: A survey
IEEE Network Praveen 2020 10.1109/MNET.001.2000005 Blockchain for 5G: A prelude to future telecommunication
IEEE Trans. Dependable Secure Comput. Connell 2018 Performance modeling of moving target defenses with reconfiguration limits
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.