Inferring OpenFlow rules by active probing in software-defined networks

作者: Po-Ching Lin , Ping-Chung Li , Van Linh Nguyen

DOI: 10.23919/ICACT.2017.7890123

关键词:

摘要: Software-defined networking (SDN) separates the control plane from underlying devices, and allows it to control the data plane from a global view. While SDN brings conveniences to …

参考文章(14)
Thomas Ristenpart, Venkatanathan Varadarajan, Yinqian Zhang, Michael Swift, A placement vulnerability study in multi-tenant public clouds usenix security symposium. pp. 913- 928 ,(2015)
Ramakrishnan Srikant, Rakesh Agrawal, Fast algorithms for mining association rules very large data bases. pp. 580- 592 ,(1998)
Junyuan Leng, Chengchen Hu, Yadong Zhou, Junjie Zhang, An Inference Attack Model for Flow Table Capacity and Usage: Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network. arXiv: Networking and Internet Architecture. ,(2015)
Hongtaek Ju, Hyeonwoo Kim, Wooguil Pak, Correlation analysis between inference accuracy and inference parameters for stateless firewall policy asia pacific network operations and management symposium. pp. 1- 6 ,(2013)
Hyeonwoo Kim, Hongtaek Ju, Efficient method for inferring a firewall policy 2011 13th Asia-Pacific Network Operations and Management Symposium. pp. 1- 8 ,(2011) , 10.1109/APNOMS.2011.6077015
Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer, FireCracker: A Framework for Inferring Firewall Policies using Smart Probing international conference on network protocols. pp. 294- 303 ,(2007) , 10.1109/ICNP.2007.4375860
Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak, Firewall Policy Reconnaissance: Techniques and Analysis IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 296- 308 ,(2014) , 10.1109/TIFS.2013.2296874
Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer, Hong Li, Firewall Policy Reconstruction by Active Probing: An Attacker's View 2006 2nd IEEE Workshop on Secure Network Protocols. pp. 20- 25 ,(2006) , 10.1109/NPSEC.2006.320342
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds computer and communications security. pp. 199- 212 ,(2009) , 10.1145/1653662.1653687
Hyojoon Kim, Nick Feamster, Improving network management with software defined networking IEEE Communications Magazine. ,vol. 51, pp. 114- 119 ,(2013) , 10.1109/MCOM.2013.6461195