A survey of security in software defined networks

S Scott-Hayward, S Natarajan… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The proposition of increased innovation in network applications and reduced cost for
network operators has won over the networking world to the vision of software-defined …

Software defined networking architecture, security and energy efficiency: A survey

DB Rawat, SR Reddy - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Software-defined networking (SDN) is an emerging paradigm, which breaks the vertical
integration in traditional networks to provide the flexibility to program the network through …

Tactical provenance analysis for endpoint detection and response systems

WU Hassan, A Bates, D Marino - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …

Fear and logging in the internet of things

Q Wang, WU Hassan, A Bates, C Gunter - Network and Distributed …, 2018 - par.nsf.gov
As the Internet of Things (IoT) continues to proliferate, diagnosing incorrect behavior within
increasingly-automated homes becomes considerably more difficult. Devices and apps may …

Nodoze: Combatting threat alert fatigue with automated provenance triage

WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li… - network and distributed …, 2019 - par.nsf.gov
Large enterprises are increasingly relying on threat detection softwares (eg, Intrusion
Detection Systems) to allow them to spot suspicious activities. These softwares generate …

A taxonomy of blockchain-enabled softwarization for secure UAV network

A Kumari, R Gupta, S Tanwar, N Kumar - Computer Communications, 2020 - Elsevier
The recent advancements in unmanned aerial vehicles (UAVs) upsurges its usages in
commercial and civilian applications such as surveillance, rescue, and crowdsensing. UAVs …

Trustworthy {Whole-System} provenance for the linux kernel

A Bates, DJ Tian, KRB Butler, T Moyer - 24th USENIX Security …, 2015 - usenix.org
In a provenance-aware system, mechanisms gather and report metadata that describes the
history of each object being processed on the system, allowing users to understand how …

Towards scalable cluster auditing through grammatical inference over provenance graphs

WU Hassan, L Aguse, N Aguse, A Bates… - Network and Distributed …, 2018 - par.nsf.gov
Investigating the nature of system intrusions in large distributed systems remains a
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …

Rain: Refinable attack investigation with on-demand inter-process information flow tracking

Y Ji, S Lee, E Downing, W Wang, M Fazzini… - Proceedings of the …, 2017 - dl.acm.org
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …

A systematic survey on cloud forensics challenges, solutions, and future directions

B Manral, G Somani, KKR Choo, M Conti… - ACM Computing …, 2019 - dl.acm.org
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …