Secure and energy-efficient network topology obfuscation for software-defined WSNs

M Bin-Yahya, X Shen - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Network topology obfuscation (NTO) is generally considered as a promising proactive
mechanism to mitigate traffic analysis attacks. The main challenge is to strike a balance …

[PDF][PDF] EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation.

J Kim, E Marin, M Conti, S Shin - NDSS, 2022 - ndss-symposium.org
Path tracing tools, such as traceroute, are simple yet fundamental network debugging tools
for network operators to detect and fix network failures. Unfortunately, adversaries can also …

Netobfu: A lightweight and efficient network topology obfuscation defense scheme

Y Liu, J Zhao, G Zhang, C Xing - Computers & Security, 2021 - Elsevier
Link flooding attack (LFA) is an attack based on network topology information. It has been
one of the major threats to the Internet due to its low cost and high concealability feature …

{NetHide}: Secure and practical network topology obfuscation

R Meier, P Tsankov, V Lenders, L Vanbever… - 27th USENIX Security …, 2018 - usenix.org
Simple path tracing tools such as traceroute allow malicious users to infer network
topologies remotely and use that knowledge to craft advanced denial-of-service (DoS) …

Effective topology tampering attacks and defenses in software-defined networks

R Skowyra, L Xu, G Gu, V Dedhia… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
As Software-Defined Networking has gained increasing prominence, new attacks have been
demonstrated which can corrupt the SDN controller's view of network topology. These …

Analysis of topology poisoning attacks in software-defined networking

T Bui, M Antikainen, T Aura - Secure IT Systems: 24th Nordic Conference …, 2019 - Springer
In software-defined networking (SDN), routing decisions are made by a trusted network
controller, which communicates with each forwarding device over a secure control channel …

Security of Topology Discovery Service in SDN: Vulnerabilities and Countermeasures

S Soltani, A Amanlou, M Shojafar… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
Software-Defined Network (SDN) controller needs comprehensive visibility of the whole
network to provide effective routing and forwarding decisions in the data layer. However, the …

Proactive defense for internet-of-things: moving target defense with cyberdeception

M Ge, JH Cho, D Kim, G Dixit, IR Chen - ACM Transactions on Internet …, 2021 - dl.acm.org
Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised
by attackers, because strong security protections may not be suitable to be deployed. This …

Defense against software-defined network topology poisoning attacks

Y Gao, M Xu - Tsinghua Science and Technology, 2022 - ieeexplore.ieee.org
Software-Defined Network (SDN) represents a new network paradigm. Unlike conventional
networks, SDNs separate control planes and data planes. The function of a data plane is …

Attacking network isolation in software-defined networks: New attacks and countermeasures

R Xiao, H Zhu, C Song, X Liu… - 2018 27th international …, 2018 - ieeexplore.ieee.org
With the development of virtualization technology and fast expansion of network-scale, SDN
has been employed in various cases from campus networks to cloud data center networks …