Secure virtual network embedding to mitigate the risk of covert channel attacks.
Zhiming WangJiangxing WuZehua GuoGuozhen ChengHongchao HuPublished in: INFOCOM Workshops (2016)
Keyphrases
- covert channel
- network traffic
- traffic analysis
- security requirements
- security measures
- scale free networks
- security threats
- security mechanisms
- watermarking algorithm
- security issues
- countermeasures
- security risks
- cryptographic protocols
- stream cipher
- complex networks
- network topologies
- computer networks
- intrusion detection
- software engineering
- data mining
- security protocols
- scale free
- network structure