Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Security in Software-Defined Networking: Threats and Countermeasures
by
Lin, Jiaxiang
, Li, Di
, Vasilakos, Athanasios V.
, Imran, Muhammad
, Shu, Zhaogang
, Wan, Jiafu
in
Analysis
/ Architecture (computers)
/ Cloud computing
/ Communications Engineering
/ Computer Communication Networks
/ Computer information security
/ Computer networks
/ Controllers
/ Countermeasures
/ Distribuerade datorsystem
/ Electrical Engineering
/ Engineering
/ IT in Business
/ Logic
/ Mobile communications networks
/ Network security
/ Network topologies
/ Networks
/ Pervasive Mobile Computing
/ Security
/ Software
/ Studies
/ Threat evaluation
/ Wireless networks
2016
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Security in Software-Defined Networking: Threats and Countermeasures
by
Lin, Jiaxiang
, Li, Di
, Vasilakos, Athanasios V.
, Imran, Muhammad
, Shu, Zhaogang
, Wan, Jiafu
in
Analysis
/ Architecture (computers)
/ Cloud computing
/ Communications Engineering
/ Computer Communication Networks
/ Computer information security
/ Computer networks
/ Controllers
/ Countermeasures
/ Distribuerade datorsystem
/ Electrical Engineering
/ Engineering
/ IT in Business
/ Logic
/ Mobile communications networks
/ Network security
/ Network topologies
/ Networks
/ Pervasive Mobile Computing
/ Security
/ Software
/ Studies
/ Threat evaluation
/ Wireless networks
2016
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Security in Software-Defined Networking: Threats and Countermeasures
by
Lin, Jiaxiang
, Li, Di
, Vasilakos, Athanasios V.
, Imran, Muhammad
, Shu, Zhaogang
, Wan, Jiafu
in
Analysis
/ Architecture (computers)
/ Cloud computing
/ Communications Engineering
/ Computer Communication Networks
/ Computer information security
/ Computer networks
/ Controllers
/ Countermeasures
/ Distribuerade datorsystem
/ Electrical Engineering
/ Engineering
/ IT in Business
/ Logic
/ Mobile communications networks
/ Network security
/ Network topologies
/ Networks
/ Pervasive Mobile Computing
/ Security
/ Software
/ Studies
/ Threat evaluation
/ Wireless networks
2016
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Security in Software-Defined Networking: Threats and Countermeasures
Journal Article
Security in Software-Defined Networking: Threats and Countermeasures
2016
Request Book From Autostore
and Choose the Collection Method
Overview
In recent years, Software-Defined Networking (SDN) has been a focus of research. As a promising network architecture, SDN will possibly replace traditional networking, as it brings promising opportunities for network management in terms of simplicity, programmability, and elasticity. While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be also paid to security at this early design stage. This paper focuses on the security aspects of SDN. We begin by discussing characteristics and standards of SDN. On the basis of these, we discuss the security features as a whole and then analyze the security threats and countermeasures in detail from three aspects, based on which part of the SDN paradigm they target, i.e., the data forwarding layer, the control layer and the application layer. Countermeasure techniques that could be used to prevent, mitigate, or recover from some of such attacks are also described, while the threats encountered when developing these defensive mechanisms are highlighted.
Publisher
Springer US,Springer Nature B.V
This website uses cookies to ensure you get the best experience on our website.