|
[1] Hong, Sungmin, et al., “Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures,” NDSS, 2015. [2] Tri-Hai Nguyen, Myungsik Yoo, Attacks on Host Tracker in SDN Controller: Investigation and Prevention, IEEE ICTC, 2016 [3] http://sdnsecurity.org/project_SDN-Security-Vulnerbility-attack-list.html [4] OpenFlow Specification v1.5.1. https://www.opennetworking.org/wpcontent/ uploads/.../openflow-switch-v1.5.1.pdf [5] Nicira, Open vSwitch project https://www.openvswitch.org/ [6] Floodlight controller. Open Source Software for Building SoftwareDefined Networks. Available: http://www.projectfloodlight.org/ [7] T.L. Foundation, “Opendaylight Project” https://www.opendaylight.org/ [8] Performance evaluation of sdn controllers: Floodlight and OpenDaylight Engineering Journal, 17(2), 47-57. https://doi.org/10.31436/iiumej.v17i2.615 [9] Mininet. Rapid prototyping for software defined networks. [10] Scapy: Packet manipulation program. http://www.secdev.org/projects/scapy/. [11] Dhawan, Mohan, et al., “SPHINX: Detecting Security Attacks in Software-Defined Networks,” NDSS, 2015. [12] Ahmad, Ijaz, et al., “Security in software defined networks: A survey,” IEEE Communications Surveys & Tutorials 17.4, 2015, pp. 2317-2346. [13] K. Benton, L. J. Camp, and C. Small. Openflow vulnerability assessment. In Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN’13), August 2013. [14] Openflow wireshark dissector. http://archive.openflow.org/wk/index.php/OpenFlow Wireshark Dissector. [15] Y. Qian, W. You, and K. Qian, “OpenFlow flow table overflow attacks and countermeasures,” in Proc. Eur. Conf. Netw. Commun., Jun. 2016,pp. 205–209. [16] D. Kreutz, F. M. Ramos, and P. Verissimo, “Towards secure and dependable software-defined networks,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking(HotSDN), 2013. [17] H. Wang, L. Xu, and G. Gu, “FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks,” in 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),2015. [18] Shin S, Porras P, Yegneswaran V, Fong M, Gu G, Tyson M. FRESCO: Modular composable security services for software-defined networks,Network and Distributed Security Symposium 2013. [19] S. Lee, C. Yoon, C. Lee, S. Shin, V. Yegneswaran, and P. Porras, “Delta: A security assessment framework for software-defined networks,” in NDSS, vol. 17, 2017. [20] L. Xu, J. Huang, S. Hong, J. Zhang, and G. Gu, “Attacking the brain: Races in the sdn control plane,” in USENIX Security Symposium. USENIX, 2017, pp. 451–468. [21] S. K. Fayaz, Y. Tobioka, V. Sekar, and M. Bailey, “Bohatei: Flexible and elastic ddos defense.” in USENIX Security Symposium, 2015, pp.817–832. [22] Anat Bremler-Barr, Yotam Harchol, David Hay, and Yaron Koral,“Deep Packet Inspection as a Service,” In Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (CoNEXT), NY, USA, 271- 282, 2014. [23] Joao Martins, Mohamed Ahmed, Costin Raiciu, Vladimir Olteanu, Michio Honda, Roberto Bifulco, and Felipe Huici, “ClickOS and the art of network function virtualization.” In Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI). USENIX Association, Berkeley, CA, USA, 459-473, 2014. [24] S. Jero, W. Koch, R. Skowyra, H. Okhravi, C. Nita-Rotaru, and D. Bigelow,“Identifier binding attacks and defenses in software-defined networks,” in USENIX Security Symposium. USENIX Association, 2017, pp. 415–432. [25] Menghao Zhang, Jun Bi, Jiasong Bai, Guanyu Li, “FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks” IEEE BigDataSE.2018
|