A survey of security in software defined networks
S Scott-Hayward, S Natarajan… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The proposition of increased innovation in network applications and reduced cost for
network operators has won over the networking world to the vision of software-defined …
network operators has won over the networking world to the vision of software-defined …
Software defined networking architecture, security and energy efficiency: A survey
DB Rawat, SR Reddy - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Software-defined networking (SDN) is an emerging paradigm, which breaks the vertical
integration in traditional networks to provide the flexibility to program the network through …
integration in traditional networks to provide the flexibility to program the network through …
Tactical provenance analysis for endpoint detection and response systems
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …
by matching system events against known adversarial behaviors. However, current solutions …
Fear and logging in the internet of things
As the Internet of Things (IoT) continues to proliferate, diagnosing incorrect behavior within
increasingly-automated homes becomes considerably more difficult. Devices and apps may …
increasingly-automated homes becomes considerably more difficult. Devices and apps may …
Nodoze: Combatting threat alert fatigue with automated provenance triage
Large enterprises are increasingly relying on threat detection softwares (eg, Intrusion
Detection Systems) to allow them to spot suspicious activities. These softwares generate …
Detection Systems) to allow them to spot suspicious activities. These softwares generate …
A taxonomy of blockchain-enabled softwarization for secure UAV network
The recent advancements in unmanned aerial vehicles (UAVs) upsurges its usages in
commercial and civilian applications such as surveillance, rescue, and crowdsensing. UAVs …
commercial and civilian applications such as surveillance, rescue, and crowdsensing. UAVs …
Trustworthy {Whole-System} provenance for the linux kernel
In a provenance-aware system, mechanisms gather and report metadata that describes the
history of each object being processed on the system, allowing users to understand how …
history of each object being processed on the system, allowing users to understand how …
Towards scalable cluster auditing through grammatical inference over provenance graphs
Investigating the nature of system intrusions in large distributed systems remains a
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …
Rain: Refinable attack investigation with on-demand inter-process information flow tracking
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …
their early stages becomes virtually impossible. Instead, an attack investigation or …
A systematic survey on cloud forensics challenges, solutions, and future directions
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …
government agencies (eg, US National Institute of Standards and Technology), although …