Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security
The industrial control systems are facing an increasing number of sophisticated cyber
attacks that can have very dangerous consequences on humans and their environments. In …
attacks that can have very dangerous consequences on humans and their environments. In …
Towards improving resilience of controller placement with minimum backup capacity in software defined networks
The number of controllers required to manage the network and locations of these controllers
affect various aspects of the separated controller plane including the performance metrics …
affect various aspects of the separated controller plane including the performance metrics …
A security enforcement framework for SDN controller using game theoretic approach
Software-defined networking (SDN) has gained significant attention as the future
deployment platform for the Internet and enterprise networks. The major advantages of SDN …
deployment platform for the Internet and enterprise networks. The major advantages of SDN …
Byzantine-resilient controller map** and remap** in software defined networks
In software-defined networks, a compromised controller that is Byzantine in nature would
issue inconsistent messages selectively to its communicating nodes. Defending against …
issue inconsistent messages selectively to its communicating nodes. Defending against …
Game-theoretic framework for malicious controller detection in software defined networks
The separation of control and data plane in Software Defined Networking (SDN) introduces
new security threats. A compromised controller can leverage its position to perform attacks …
new security threats. A compromised controller can leverage its position to perform attacks …
Anomalous rule detection using machine learning in software defined networks
The centralized control plane in Software Defined Networking (SDN) introduces new
security threats to the network. A compromised controller can install malicious rules at the …
security threats to the network. A compromised controller can install malicious rules at the …