Hu et al., 2020 - Google Patents
Blockchain-aided flow insertion and verification in software defined networksHu et al., 2020
View PDF- Document ID
- 9198970007045988351
- Author
- Hu J
- Reed M
- Al-Naday M
- Thomos N
- Publication year
- Publication venue
- 2020 Global Internet of Things Summit (GIoTS)
External Links
Snippet
The Internet of Things (IoT) connected by Software Defined Networking (SDN) promises to bring great benefits to cyber-physical systems. However, the increased attack surface offered by the growing number of connected vulnerable devices and complex nature of SDN …
- 238000003780 insertion 0 title abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tian et al. | Block-DEF: A secure digital evidence framework using blockchain | |
| Li et al. | ATM: An active-detection trust mechanism for VANETs based on blockchain | |
| Sahay et al. | A novel blockchain based framework to secure IoT-LLNs against routing attacks | |
| Hu et al. | Blockchain-aided flow insertion and verification in software defined networks | |
| Gil Pérez et al. | RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms | |
| Yu et al. | DNSTSM: DNS cache resources trusted sharing model based on consortium blockchain | |
| Braun et al. | CA trust management for the Web PKI | |
| Zhao et al. | TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain | |
| Huang et al. | Towards trusted and efficient SDN topology discovery: A lightweight topology verification scheme | |
| CN114900294B (en) | A trust measurement and remote attestation method and system for the perception layer of the Internet of Things | |
| Liu et al. | DePTVM: Decentralized pseudonym and trust value management for integrated networks | |
| Khan et al. | DTMS: A dual trust-based multi-level sybil attack detection approach in WSNs | |
| Al Ghamdi | An optimized and secure energy-efficient blockchain-based framework in IoT | |
| Neureither et al. | LegIoT: Ledgered trust management platform for IoT | |
| Ramalingam et al. | Fork-Hook encryption policy based secured Data Centric Routing Gateway for proactive trust ware data transmission in WBSN | |
| Li et al. | Blockchain for data sharing at the network edge: Trade-off between capability and security | |
| Li et al. | BlockREV: Blockchain‐Enabled Multi‐Controller Rule Enforcement Verification in SDN | |
| Anita et al. | A lightweight scalable and secure blockchain based IoT using fuzzy logic | |
| Rahman et al. | Blockchain-based and fuzzy logic-enabled false data discovery for the intelligent autonomous vehicular system | |
| Ahmad et al. | Packet integrity defense mechanism in OppNets | |
| Sharma et al. | Abusive Adversaries in 5G and beyond IoT | |
| Duan et al. | An edge cloud data integrity protection scheme based on Blockchain | |
| Classen et al. | A distributed reputation system for certification authority trust management | |
| Feng et al. | A novel trust evaluation mechanism for edge device access of the Internet of things | |
| CN102457476B (en) | Security defend method and system for peer-to-peer network |