完整後設資料紀錄
DC 欄位語言
dc.contributor.authorAbdullaziz, Osamah Ibrahiemen_US
dc.contributor.authorWang, Li-Chunen_US
dc.date.accessioned2020-05-05T00:01:59Z-
dc.date.available2020-05-05T00:01:59Z-
dc.date.issued2019-01-01en_US
dc.identifier.isbn978-1-5386-7646-2en_US
dc.identifier.issn1525-3511en_US
dc.identifier.urihttp://hdl.handle.net/11536/154052-
dc.description.abstractBecause of SDN centralization nature, denial of service (DoS) attacks have become a prominent concern. In the OpenFlow (OF) protocol, the transport layer security (TLS) protocol is recommended to secure the control channel. Unfortunately, the tasks involved in the proper configuration of a secured TLS are very challenging. Even worse, TLS is made an optional mode of communication in OF. As a consequence, some OF-enabled switches and controllers do not adopt TLS. In this paper, we develop a lightweight authentication mechanism, called Hidden Authentication (HiAuth), to protect SDN controller against DoS attacks. HiAuth legitimizes SDN forwarding devices by hiding authentication information into the header of control channel packets. Our experimental results prove that HiAuth is lightweight and can not only mitigate DoS attacks, but also provide high undetectability to the attacker.en_US
dc.language.isoen_USen_US
dc.subjectSoftware defined networking (SDN)en_US
dc.subjectOpenFlowen_US
dc.subjectDenial of service (DoS) attacksen_US
dc.subjectInformation hidingen_US
dc.titleMitigating DoS Attacks against SDN Controller Using Information Hidingen_US
dc.typeProceedings Paperen_US
dc.identifier.journal2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)en_US
dc.citation.spage0en_US
dc.citation.epage0en_US
dc.contributor.department電機工程學系zh_TW
dc.contributor.departmentDepartment of Electrical and Computer Engineeringen_US
dc.identifier.wosnumberWOS:000519086301085en_US
dc.citation.woscount0en_US
顯示於類別:會議論文