+

Hu et al., 2020 - Google Patents

Blockchain-aided flow insertion and verification in software defined networks

Hu et al., 2020

View PDF
Document ID
9198970007045988351
Author
Hu J
Reed M
Al-Naday M
Thomos N
Publication year
Publication venue
2020 Global Internet of Things Summit (GIoTS)

External Links

Snippet

The Internet of Things (IoT) connected by Software Defined Networking (SDN) promises to bring great benefits to cyber-physical systems. However, the increased attack surface offered by the growing number of connected vulnerable devices and complex nature of SDN …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources

Similar Documents

Publication Publication Date Title
Tian et al. Block-DEF: A secure digital evidence framework using blockchain
Li et al. ATM: An active-detection trust mechanism for VANETs based on blockchain
Sahay et al. A novel blockchain based framework to secure IoT-LLNs against routing attacks
Hu et al. Blockchain-aided flow insertion and verification in software defined networks
Gil Pérez et al. RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms
Yu et al. DNSTSM: DNS cache resources trusted sharing model based on consortium blockchain
Braun et al. CA trust management for the Web PKI
Zhao et al. TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain
Huang et al. Towards trusted and efficient SDN topology discovery: A lightweight topology verification scheme
CN114900294B (en) A trust measurement and remote attestation method and system for the perception layer of the Internet of Things
Liu et al. DePTVM: Decentralized pseudonym and trust value management for integrated networks
Khan et al. DTMS: A dual trust-based multi-level sybil attack detection approach in WSNs
Al Ghamdi An optimized and secure energy-efficient blockchain-based framework in IoT
Neureither et al. LegIoT: Ledgered trust management platform for IoT
Ramalingam et al. Fork-Hook encryption policy based secured Data Centric Routing Gateway for proactive trust ware data transmission in WBSN
Li et al. Blockchain for data sharing at the network edge: Trade-off between capability and security
Li et al. BlockREV: Blockchain‐Enabled Multi‐Controller Rule Enforcement Verification in SDN
Anita et al. A lightweight scalable and secure blockchain based IoT using fuzzy logic
Rahman et al. Blockchain-based and fuzzy logic-enabled false data discovery for the intelligent autonomous vehicular system
Ahmad et al. Packet integrity defense mechanism in OppNets
Sharma et al. Abusive Adversaries in 5G and beyond IoT
Duan et al. An edge cloud data integrity protection scheme based on Blockchain
Classen et al. A distributed reputation system for certification authority trust management
Feng et al. A novel trust evaluation mechanism for edge device access of the Internet of things
CN102457476B (en) Security defend method and system for peer-to-peer network
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载