Security in SDN: A comprehensive survey

JCC Chica, JC Imbachi, JFB Vega - Journal of Network and Computer …, 2020 - Elsevier
Abstract Software Defined Networking (SDN) is a revolutionary paradigm that is maturing
along with other network technologies in the next-gen trend. The separation of control and …

[HTML][HTML] From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions

S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat… - algorithms, 2017 - mdpi.com
In the past few decades, the rise in attacks on communication devices in networks has
resulted in a reduction of network functionality, throughput, and performance. To detect and …

Classification of security threats in information systems

M Jouini, LBA Rabai, AB Aissa - Procedia Computer Science, 2014 - Elsevier
Abstract Information systems are frequently exposed to various types of threats which can
cause different types of damages that might lead to significant financial losses. Information …

[PDF][PDF] Intrusion detection systems: A survey and taxonomy

S Axelsson - 2000 - Citeseer
This paper presents a taxonomy of intrusion detection systems that is then used to survey
and classify a number of research prototypes. The taxonomy consists of a classification first …

[BOK][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

[HTML][HTML] Survey and classification of automotive security attacks

F Sommer, J Dürrwang, R Kriesten - Information, 2019 - mdpi.com
Due to current development trends in the automotive industry towards stronger connected
and autonomous driving, the attack surface of vehicles is growing which increases the risk of …

Watermarking, tamper-proofing, and obfuscation-tools for software protection

CS Collberg, C Thomborson - IEEE Transactions on software …, 2002 - ieeexplore.ieee.org
We identify three types of attack on the intellectual property contained in software and three
corresponding technical defenses. A defense against reverse engineering is obfuscation, a …

A taxonomy of network and computer attacks

S Hansman, R Hunt - Computers & Security, 2005 - Elsevier
Attacks over the years have become both increasingly numerous and sophisticated. This
paper focuses on the provisioning of a method for the analysis and categorisation of both …

Virtualization: Issues, security threats, and solutions

M Pearce, S Zeadally, R Hunt - ACM computing surveys (CSUR), 2013 - dl.acm.org
Although system virtualization is not a new paradigm, the way in which it is used in modern
system architectures provides a powerful platform for system building, the advantages of …

A common language for computer security incidents

JD Howard, TA Longstaff - 1998 - osti.gov
Much of the computer security information regularly gathered and disseminated by
individuals and organizations cannot currently be combined or compared because a …