MARC보기
LDR02766nmm uu200409 4500
001000000330903
00520240805163036
008181129s2018 |||||||||||||||||c||eng d
020 ▼a 9780438134355
035 ▼a (MiAaPQ)AAI10903610
040 ▼a MiAaPQ ▼c MiAaPQ ▼d 248032
0820 ▼a 004
1001 ▼a Achleitner, Stefan.
24510 ▼a Security in Software Defined Networking an Analysis of New Attack and Defense Vectors.
260 ▼a [S.l.] : ▼b The Pennsylvania State University., ▼c 2018
260 1 ▼a Ann Arbor : ▼b ProQuest Dissertations & Theses, ▼c 2018
300 ▼a 172 p.
500 ▼a Source: Dissertation Abstracts International, Volume: 79-12(E), Section: B.
5021 ▼a Thesis (Ph.D.)--The Pennsylvania State University, 2018.
520 ▼a Software Defined Networking (SDN) is a novel concept in computer networks that enables a central controlling platform to dynamically program the data-plane of a network with the usage of flow rules. This separation of the control- and data-plane
520 ▼a In particular, we investigate network reconnaissance which is performed by malicious insiders and is a pre-phase of advanced targeted cyber attacks. Network virtualization techniques, such as SDN, provide the ability to deploy novel defense mech
520 ▼a Attacks such as denial of service, that are launched on SDN-enabled networks may affect current flows traversing the network and disrupt the provided services. For a quick and successful reconfiguration of an SDN-enabled network to reestablish t
520 ▼a While SDN provides a platform for the development of novel defense approaches, weaknesses arise if attackers apply advanced techniques, such as network forensics, to exploit the configuration details of SDN-based applications. To demonstrate tha
520 ▼a Adversaries performing advanced network forensics as well as numerous other attack strategies on SDN, pursue different goals but are all based on a small set of attack techniques. Once untrusted nodes are in the perimeter of a network, actions s
520 ▼a The security issues pointed out in this work motivate the requirement for agile and advanced defense approaches which are able to dynamically react to cyber attacks not addressed by traditional defense mechanisms. The analysis of attack and defe
590 ▼a School code: 0176.
650 4 ▼a Computer science.
690 ▼a 0984
71020 ▼a The Pennsylvania State University. ▼b Computer Science and Engineering.
7730 ▼t Dissertation Abstracts International ▼g 79-12B(E).
773 ▼t Dissertation Abstract International
790 ▼a 0176
791 ▼a Ph.D.
792 ▼a 2018
793 ▼a English
85640 ▼u http://www.riss.kr/pdu/ddodLink.do?id=T15000620 ▼n KERIS
980 ▼a 201812 ▼f 2019
990 ▼a 관리자