Filters








376 Hits in 3.8 sec

Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions

Gaurav Pathak, Jairo Gutierrez, Saeed Ur Rehman
2020 Electronics  
Finally, the applicability of SDN in LPWAN security, its opportunities, and challenges in implementation are discussed.  ...  In addition, the emergence of software defined network (SDN) architecture for security in IoT is explained based on literature.  ...  Device fingerprint is created by using previous network traffic. SDN controllers are used to identify the fingerprints of the new devices and enforce security rules on them.  ... 
doi:10.3390/electronics9081195 fatcat:ypnliknpobgwje3rilw7k5czqi

Have No PHEAR

Richard Skowyra, Kevin Bauer, Veer Dedhia, Hamed Okhravi
2016 Proceedings of the 2016 ACM Workshop on Moving Target Defense - MTD'16  
PHEAR also encrypts all packet data beyond the Network layer.  ...  However, such solutions cannot protect enterprise network traffic that does not transit the Internet.  ...  Examples of such attacks include website fingerprinting [29, 48, 49] , web browser fingerprinting [53] , identi-fication of spoken phrases in encrypted VoIP conversations [50, 51] , and inference of  ... 
doi:10.1145/2995272.2995276 dblp:conf/ccs/SkowyraBDO16 fatcat:2v3lygpbsngrbm7azwl7iivg6a

P4-MACsec: Dynamic Topology Monitoring and Data Layer Protection with MACsec in P4-Based SDN

Frederik Hauser, Mark Schmidt, Marco Haberle, Michael Menth
2020 IEEE Access  
P4-MACsec features a two-tier control plane structure where local controllers running on the P4 targets interact with a central controller.  ...  P4-MACsec suggests a data plane implementation of MACsec including AES-GCM encryption and decryption directly on P4 targets.  ...  According to [30] , IPsec traffic typically cannot exceed 40 Gb/s of bidirectional traffic while MACsec encryption and decryption scales with line rate. D. APPLICATION OF MACsec IN SDN Choi et al.  ... 
doi:10.1109/access.2020.2982859 fatcat:tw5aigaemjawjhk4ctz27jiklm

Machine Learning based Malicious Payload Identification in Software-Defined Networking [article]

Qiumei Cheng, Chunming WU, Haifeng Zhou, Dezhang Kong, Dong Zhang, Junchi Xing, Wei Ruan
2021 arXiv   pre-print
In order to balance the detection accuracy and performance bottleneck of the SDN controller, OFDPI introduces an adaptive packet sampling window based on the linear prediction; and (ii) for encrypted packets  ...  A prototype of OFDPI is implemented on the Ryu SDN controller and the Mininet platform.  ...  encrypted traffic. performance of the SDN controller.  ... 
arXiv:2101.00847v1 fatcat:igzhnf4tvnfpvddrehx256rcfu

Table of Contents

2020 2020 IEEE 45th Conference on Local Computer Networks (LCN)  
for IoT Applications with Multiple Sources in Mobile Edge Computing 42 PLEDGE: An IoT-Oriented Proof-Of-Honesty Based Blockchain Consensus Protocol 54 Understanding Traffic Fingerprinting CNNs  ...  Glass: An Empirical Analysis of Android Security Apps 381 ACOMTA: An Ant Colony Optimisation Based Multi-Task Assignment Algorithm for Reverse Auction Based Mobile Crowdsensing 385 SETA: Scalable Encrypted  ... 
doi:10.1109/lcn48667.2020.9314824 fatcat:ijv6a3vurbd2zjmdmkt7bxle4q

P4-MACsec: Dynamic Topology Monitoring and Data Layer Protection with MACsec in P4-SDN [article]

Frederik Hauser and Mark Schmidt and Marco Häberle and Michael Menth
2019 arXiv   pre-print
P4-MACsec features a two-tier control plane structure where local controllers running on the P4 switches interact with a central controller.  ...  P4-MACsec introduces a data plane implementation of MACsec including AES-GCM encryption and decryption directly on P4 switches.  ...  This way, the SDN controller detects direct links via LLDP and indirect links via BDDP. IV.  ... 
arXiv:1904.07088v1 fatcat:32hvr63rlraqvaxy4msgysrihe

Blessing or curse? Revisiting security aspects of Software-Defined Networking

Lisa Schehlmann, Sebastian Abt, Harald Baier
2014 10th International Conference on Network and Service Management (CNSM) and Workshop  
as well as confidentiality, authenticity, integrity and consistency of network traffic and control data.  ...  First, it enables network security functions by design, because traffic flows can be redirected or filtered based on packet content or application layer state -functionality, which to date requires additional  ...  The controller provides a global view of the network via a north-bound API to the applications (e.g. SDN management applications).  ... 
doi:10.1109/cnsm.2014.7014199 dblp:conf/cnsm/SchehlmannAB14 fatcat:5imxrrbbqng3dnewdxt4rzfhna

HoneyMix

Wonkyu Han, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
2016 Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization - SDN-NFV Security '16  
Hon-eyMix leverages the rich programmability of SDN to circumvent attackers' detection mechanisms and enables finegrained data control for honeynet.  ...  control mechanisms.  ...  rules via SDN switches.  ... 
doi:10.1145/2876019.2876022 dblp:conf/codaspy/HanZDA16 fatcat:bcvrie4p65a55mvt4gcoeoozsy

Machine Learning Techniques for Securing IoT Environment

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The core idea is based on SDN controller which dynamically control the traffic flow also separate the control plane and data plane.  ...  SDN controller.  ... 
doi:10.35940/ijitee.d1209.029420 fatcat:gdovnd52czd3jpkmxgiwepnvbq

Deployment of Blockchain Technology in Software Defined Networks: A survey

Talal Alharbi
2020 IEEE Access  
shape all entire network traffic pattern.  ...  control plane from the data plane.  ...  with actions initiated by applications running on the SDN controller and installed on network devices via the so-called southbound interface [26] .  ... 
doi:10.1109/access.2020.2964751 fatcat:4ctdrthqozfnjiwxounred7gwm

SiegeBreaker: An SDN Based Practical Decoy Routing System

Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, H.B. Acharya, Sambuddho Chakravarty
2020 Proceedings on Privacy Enhancing Technologies  
In contrast, SB distributes the tasks for DR among three independent modules. (1) The SDN controller identifies DR requests via a covert, privacy preserving scheme, and does not need to inspect all flows  ...  . (2) The reconfigurable SDN switch intercepts packets, and forwards them to a secret proxy efficiently. (3) The secret proxy server proxies the client's traffic to the censored site.  ...  application layer.  ... 
doi:10.2478/popets-2020-0051 fatcat:ivyiogj5i5be3d5xem5j2qsnfu

5G security: Analysis of threats and solutions

Ijaz Ahmad, Tanesh Kumar, Madhusanka Liyanage, Jude Okwuibe, Mika Ylianttila, Andrei Gurtov
2017 2017 IEEE Conference on Standards for Communications and Networking (CSCN)  
The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G.  ...  The SDN controller modifies flow rules in the data path, hence the controller traffic can be easily identified.  ...  In SDN, the controller can gather network stats through the south-bound API from network equipment to see if the traffic levels increase.  ... 
doi:10.1109/cscn.2017.8088621 dblp:conf/cscn/AhmadKLOYG17 fatcat:kdc66olm4nf4xdz4i2qq6g2fsa

Network Security in the Cloud [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
We look at how companies like M2Mi are automating the many steps required to enable the network security functions via high-level programmatic APIs, and we show how this automation is having a direct impact  ...  We will also briefly examine software-defined networks (SDN), an emerging technology bringing solutions that seem to address some of key requirements of cloud computing and that has implications for network  ...  These connections are typically authenticated and then secured using encryption techniques. This prevents networked traffic from being analyzed via sniffing techniques.  ... 
doi:10.1007/978-1-4302-6146-9_6 fatcat:rlytx7ls7bdefl35xoykwrm6te

Security in OpenFlow Enabled Cloud Environment

Abdalla Alameen, Sadia Rubab, Bhawna Dhupia, Manjur Kolhar
2017 International Journal of Advanced Computer Science and Applications  
In [Resonance], they have delegated traffic management to the network devices. Researchers [Resonance] have used programmable network elements to control network traffic.  ...  Inception of flow tables as data plane abstraction, and forwarding rules that are managed by centralized controllers in emerging Software Defined Networks (SDN) has stemmed significant progress in OpenFlow  ...  Security Frameworks of SDN In [46] , researchers proved that, adversaries passively and actively can fingerprint SDN networks.  ... 
doi:10.14569/ijacsa.2017.080721 fatcat:l4hccbuj7vev5emyziq6u763pu

Impact on SDN Powered Network Services Under Adversarial Attacks

Quamar Niyaz, Weiqing Sun, Mansoor Alam
2015 Procedia Computer Science  
Logically centralized nature of the controller in Software-defined Networking (SDN) makes it vulnerable to various adversarial attacks.  ...  For this reason, a large-scale deployment of SDN needs evaluation of the impact of adversarial attacks on network services.  ...  However, if the signalling traffic is carried out via an insecure channel, a man-in-the-middle attack can be launched easily.  ... 
doi:10.1016/j.procs.2015.08.444 fatcat:ncwcogaypfderclzdq3rzs625q
« Previous Showing results 1 — 15 out of 376 results