SDN-based edge computing security: detecting and mitigating flow rule attacks.
Sonali Sen BaidyaRattikorn HewettPublished in: SEC (2019)
Keyphrases
- security threats
- security problems
- security mechanisms
- malicious activities
- security protocols
- cyber attacks
- computer security
- security vulnerabilities
- security issues
- security measures
- java card
- security risks
- stream cipher
- countermeasures
- malicious users
- fault injection
- insider attacks
- intrusion detection
- malicious attacks
- cryptographic protocols
- information security
- information leakage
- identity theft
- security breaches
- secure routing
- chosen plaintext
- security requirements
- network intrusion detection systems
- intrusion prevention
- security flaws
- edge detection
- access control
- denial of service attacks
- cryptographic algorithms
- intrusion detection and prevention
- information flow
- dos attacks
- security policies
- network security
- cyber security
- detecting malicious
- buffer overflow
- association rules
- watermarking scheme
- biometric systems
- sensitive data
- security management