|
[1] S. Scott-Hayward, C. Kane, and S. Sezer, “Operationcheckpoint: SDN application control,” in Proceedings of the IEEE 22nd International Conference on Network Protocols, Oct 2014, pp. 618–623. [2] S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh, and B. B. Kang, “Rosemary: A robust, secure, and high performance network operating system,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, ACM, 2014, pp. 78–89. [Online]. Available: http://doi.acm.org/10.1145/2660267.2660353 [3] X. Wen, B. Yang, Y. Chen, C. Hu, Y. Wang, B. Liu, and X. Chen, “SDNshield: Reconciliating configurable application permissions for SDN app markets,” in Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2016, pp. 121–132. [4] P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, “A security enforcement kernel for Openflow networks,” in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ACM, 2012, pp. 121–126. [Online]. Available: http://doi.acm.org/10.1145/2342441.2342466 [5] P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, “Securing the Software-Defined Network Control Layer,” in Proceedings of the Network and Distributed System Security Symposium (NDSS), February 2015. [6] A. Khurshid, W. Zhou, M. Caesar, and P. B. Godfrey, “Veriflow: Verifying network-wide invariants in real time,” in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ACM, 2012, pp. 49–54. [Online]. Available: http://doi.acm.org/10.1145/2342441.2342452 [7] C. Lee and S. Shin, “Shield: An automated framework for static analysis of sdn applications,” in Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, ACM, 2016, pp. 29–34. [Online]. Available: http://doi.acm.org/10.1145/2876019.2876026 [8] M. Canini, D. Venzano, P. Pereˇs´ıni, D. Kosti´c, and J. Rexford, “A nice way to test openflow applications,” in Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, USENIX Association, 2012, pp. 10–10. [Online]. Available: http://dl.acm.org/citation.cfm?id=2228298.2228312 [9] M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, “Sphinx: Detecting security attacks in software-defined networks,” in Proceedings of the Network and Distributed System Security Symposium (NDSS), February 2015. [10] HP SDN Dev Center: SDN app store [online], Available: http://www.hp.com/go/sdndevcenter. [11] Floodlight OpenFlow controller [online], Available: http://www.projectfloodlight.org/floodlight/. [12] EstiNet network simulator [online], Available: http://www.estinet.com/.
|