A survey on SCADA systems: secure protocols, incidents, threats and tactics

D Pliatsios, P Sarigiannidis, T Lagkas… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring
and control components of critical infrastructures, such as power, telecommunication …

DDoS attack detection and mitigation using SDN: methods, practices, and solutions

NZ Bawany, JA Shamsi, K Salah - Arabian Journal for Science and …, 2017 - Springer
Distributed denial-of-service (DDoS) attacks have become a weapon of choice for hackers,
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …

Software defined networking architecture, security and energy efficiency: A survey

DB Rawat, SR Reddy - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Software-defined networking (SDN) is an emerging paradigm, which breaks the vertical
integration in traditional networks to provide the flexibility to program the network through …

Fresco: Modular composable security services for software-defined networks

SW Shin, P Porras, V Yegneswara… - 20th annual network …, 2013 - koasas.kaist.ac.kr
OpenFlow is an open standard that has gained tremendous interest in the last few years
within the network community. It is an embodiment of the software-defined networking …

Revisiting traffic anomaly detection using software defined networking

SA Mehdi, J Khalid, SA Khayam - … , RAID 2011, Menlo Park, CA, USA …, 2011 - Springer
Despite their exponential growth, home and small office/home office networks continue to be
poorly managed. Consequently, security of hosts in most home networks is easily …

SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks

Y Cui, L Yan, S Li, H Xing, W Pan, J Zhu… - Journal of Network and …, 2016 - Elsevier
In order to overcome Distributed Denial of Service (DDoS) in Software Defined Networking
(SDN), this paper proposes a mechanism consisting of four modules, namely attack …

[PDF][PDF] Automated Worm Fingerprinting.

S Singh, C Estan, G Varghese, S Savage - OSDI, 2004 - usenix.org
Network worms are a clear and growing threat to the security of today's Internet-connected
hosts and networks. The combination of the Internet's unrestricted connectivity and …

[图书][B] Virtual honeypots: from botnet tracking to intrusion detection

N Provos, T Holz - 2007 - books.google.com
Honeypots have demonstrated immense value in Internet security, but physical honeypot
deployment can be prohibitively complex, time-consuming, and expensive. Now, there'sa …

A taxonomy of computer worms

N Weaver, V Paxson, S Staniford… - Proceedings of the 2003 …, 2003 - dl.acm.org
To understand the threat posed by computer worms, it is necessary to understand the
classes of worms, the attackers who may employ them, and the potential payloads. This …

[图书][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …