Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks.
Mingli YuTian XieTing HePatrick D. McDanielQuinn K. BurkePublished in: IEEE/ACM Trans. Netw. (2021)
Keyphrases
- security threats
- security problems
- security mechanisms
- security measures
- java card
- computer security
- security protocols
- countermeasures
- cyber attacks
- security breaches
- security risks
- fault injection
- security vulnerabilities
- security issues
- denial of service attacks
- information security
- malicious attacks
- cryptographic protocols
- identity theft
- industrial automation
- stream cipher
- security flaws
- chosen plaintext
- insider attacks
- intrusion detection and prevention
- secure routing
- security requirements
- intrusion detection
- information leakage
- malicious users
- access control
- information flow
- network security
- database
- cyber security
- advanced encryption standard
- smart card
- multi agent
- biometric template
- security management
- dos attacks
- cryptographic algorithms
- attack scenarios
- intrusion detection system
- security policies
- unauthorized access
- sensitive data
- intrusion prevention
- secret key