Providing elasticity to intrusion detection systems in virtualized Software Defined Networks

@article{Lopez2015ProvidingET,
  title={Providing elasticity to intrusion detection systems in virtualized Software Defined Networks},
  author={M. A. Lopez and O. Duarte},
  journal={2015 IEEE International Conference on Communications (ICC)},
  year={2015},
  pages={7120-7125}
}
  • M. A. Lopez, O. Duarte
  • Published 2015
  • Computer Science
  • 2015 IEEE International Conference on Communications (ICC)
This paper presents BroFlow, an Intrusion Detection and Prevention System based on Bro traffic analyzer, and on the global network-view feature of OpenFlow Application Programming Interface. [...] Key Result An evaluation of the system under attack shows that BroFlow guarantees the forwarding of legitimate packets at the maximal link rate, up to 90% reduction of the maximal network delay caused by the attack, and 50% of bandwidth gain compared with conventional firewalls approaches, even when the attackers are…Expand
BIDS: Bio-Inspired, Collaborative Intrusion Detection for Software Defined Networks
  • Qianru Zhou, D. Pezaros
  • Computer Science
  • ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
  • 2019
Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter
Optimal Placement of Network Security Monitoring Functions in NFV-Enabled Data Centers
A Novel Approach for Classification and Detection of DOS Attacks
Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds
...
1
2
...

References

SHOWING 1-10 OF 15 REFERENCES
SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment
Revisiting Traffic Anomaly Detection Using Software Defined Networking
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
A security enforcement kernel for OpenFlow networks
FLOWGUARD: building robust firewalls for software-defined networks
Towards secure and dependable software-defined networks
A SDN-oriented DDoS blocking scheme for botnet-based attacks
Application of anomaly detection algorithms for detecting SYN flooding attacks
...
1
2
...