Security of Software Defined Networks: A survey
Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We...
Ausführliche Beschreibung
Autor*in: |
Alsmadi, Izzat [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015transfer abstract |
---|
Schlagwörter: |
---|
Umfang: |
30 |
---|
Übergeordnetes Werk: |
Enthalten in: Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae - LaFrentz, Benjamin R. ELSEVIER, 2016transfer abstract, the international journal devoted to the study of the technical and managerial aspects of computer security, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:53 ; year:2015 ; pages:79-108 ; extent:30 |
Links: |
---|
DOI / URN: |
10.1016/j.cose.2015.05.006 |
---|
Katalog-ID: |
ELV034439617 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV034439617 | ||
003 | DE-627 | ||
005 | 20230625200908.0 | ||
007 | cr uuu---uuuuu | ||
008 | 180603s2015 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.cose.2015.05.006 |2 doi | |
028 | 5 | 2 | |a GBVA2015006000002.pica |
035 | |a (DE-627)ELV034439617 | ||
035 | |a (ELSEVIER)S0167-4048(15)00070-X | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | |a 004 | |
082 | 0 | 4 | |a 004 |q DE-600 |
082 | 0 | 4 | |a 570 |q VZ |
082 | 0 | 4 | |a 550 |q VZ |
082 | 0 | 4 | |a 610 |q VZ |
084 | |a 44.68 |2 bkl | ||
100 | 1 | |a Alsmadi, Izzat |e verfasserin |4 aut | |
245 | 1 | 0 | |a Security of Software Defined Networks: A survey |
264 | 1 | |c 2015transfer abstract | |
300 | |a 30 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. | ||
520 | |a Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. | ||
650 | 7 | |a Networking |2 Elsevier | |
650 | 7 | |a Network security |2 Elsevier | |
650 | 7 | |a Security |2 Elsevier | |
650 | 7 | |a Software defined networking |2 Elsevier | |
650 | 7 | |a Software Defined Security |2 Elsevier | |
700 | 1 | |a Xu, Dianxiang |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier Science |a LaFrentz, Benjamin R. ELSEVIER |t Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae |d 2016transfer abstract |d the international journal devoted to the study of the technical and managerial aspects of computer security |g Amsterdam [u.a.] |w (DE-627)ELV024123129 |
773 | 1 | 8 | |g volume:53 |g year:2015 |g pages:79-108 |g extent:30 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.cose.2015.05.006 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
936 | b | k | |a 44.68 |j Gerontologie |j Geriatrie |q VZ |
951 | |a AR | ||
952 | |d 53 |j 2015 |h 79-108 |g 30 | ||
953 | |2 045F |a 004 |
author_variant |
i a ia |
---|---|
matchkey_str |
alsmadiizzatxudianxiang:2015----:euiyfotaeeiento |
hierarchy_sort_str |
2015transfer abstract |
bklnumber |
44.68 |
publishDate |
2015 |
allfields |
10.1016/j.cose.2015.05.006 doi GBVA2015006000002.pica (DE-627)ELV034439617 (ELSEVIER)S0167-4048(15)00070-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 570 VZ 550 VZ 610 VZ 44.68 bkl Alsmadi, Izzat verfasserin aut Security of Software Defined Networks: A survey 2015transfer abstract 30 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security Elsevier Xu, Dianxiang oth Enthalten in Elsevier Science LaFrentz, Benjamin R. ELSEVIER Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae 2016transfer abstract the international journal devoted to the study of the technical and managerial aspects of computer security Amsterdam [u.a.] (DE-627)ELV024123129 volume:53 year:2015 pages:79-108 extent:30 https://doi.org/10.1016/j.cose.2015.05.006 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 44.68 Gerontologie Geriatrie VZ AR 53 2015 79-108 30 045F 004 |
spelling |
10.1016/j.cose.2015.05.006 doi GBVA2015006000002.pica (DE-627)ELV034439617 (ELSEVIER)S0167-4048(15)00070-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 570 VZ 550 VZ 610 VZ 44.68 bkl Alsmadi, Izzat verfasserin aut Security of Software Defined Networks: A survey 2015transfer abstract 30 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security Elsevier Xu, Dianxiang oth Enthalten in Elsevier Science LaFrentz, Benjamin R. ELSEVIER Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae 2016transfer abstract the international journal devoted to the study of the technical and managerial aspects of computer security Amsterdam [u.a.] (DE-627)ELV024123129 volume:53 year:2015 pages:79-108 extent:30 https://doi.org/10.1016/j.cose.2015.05.006 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 44.68 Gerontologie Geriatrie VZ AR 53 2015 79-108 30 045F 004 |
allfields_unstemmed |
10.1016/j.cose.2015.05.006 doi GBVA2015006000002.pica (DE-627)ELV034439617 (ELSEVIER)S0167-4048(15)00070-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 570 VZ 550 VZ 610 VZ 44.68 bkl Alsmadi, Izzat verfasserin aut Security of Software Defined Networks: A survey 2015transfer abstract 30 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security Elsevier Xu, Dianxiang oth Enthalten in Elsevier Science LaFrentz, Benjamin R. ELSEVIER Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae 2016transfer abstract the international journal devoted to the study of the technical and managerial aspects of computer security Amsterdam [u.a.] (DE-627)ELV024123129 volume:53 year:2015 pages:79-108 extent:30 https://doi.org/10.1016/j.cose.2015.05.006 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 44.68 Gerontologie Geriatrie VZ AR 53 2015 79-108 30 045F 004 |
allfieldsGer |
10.1016/j.cose.2015.05.006 doi GBVA2015006000002.pica (DE-627)ELV034439617 (ELSEVIER)S0167-4048(15)00070-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 570 VZ 550 VZ 610 VZ 44.68 bkl Alsmadi, Izzat verfasserin aut Security of Software Defined Networks: A survey 2015transfer abstract 30 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security Elsevier Xu, Dianxiang oth Enthalten in Elsevier Science LaFrentz, Benjamin R. ELSEVIER Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae 2016transfer abstract the international journal devoted to the study of the technical and managerial aspects of computer security Amsterdam [u.a.] (DE-627)ELV024123129 volume:53 year:2015 pages:79-108 extent:30 https://doi.org/10.1016/j.cose.2015.05.006 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 44.68 Gerontologie Geriatrie VZ AR 53 2015 79-108 30 045F 004 |
allfieldsSound |
10.1016/j.cose.2015.05.006 doi GBVA2015006000002.pica (DE-627)ELV034439617 (ELSEVIER)S0167-4048(15)00070-X DE-627 ger DE-627 rakwb eng 004 004 DE-600 570 VZ 550 VZ 610 VZ 44.68 bkl Alsmadi, Izzat verfasserin aut Security of Software Defined Networks: A survey 2015transfer abstract 30 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security Elsevier Xu, Dianxiang oth Enthalten in Elsevier Science LaFrentz, Benjamin R. ELSEVIER Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae 2016transfer abstract the international journal devoted to the study of the technical and managerial aspects of computer security Amsterdam [u.a.] (DE-627)ELV024123129 volume:53 year:2015 pages:79-108 extent:30 https://doi.org/10.1016/j.cose.2015.05.006 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 44.68 Gerontologie Geriatrie VZ AR 53 2015 79-108 30 045F 004 |
language |
English |
source |
Enthalten in Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae Amsterdam [u.a.] volume:53 year:2015 pages:79-108 extent:30 |
sourceStr |
Enthalten in Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae Amsterdam [u.a.] volume:53 year:2015 pages:79-108 extent:30 |
format_phy_str_mv |
Article |
bklname |
Gerontologie Geriatrie |
institution |
findex.gbv.de |
topic_facet |
Networking Network security Security Software defined networking Software Defined Security |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae |
authorswithroles_txt_mv |
Alsmadi, Izzat @@aut@@ Xu, Dianxiang @@oth@@ |
publishDateDaySort_date |
2015-01-01T00:00:00Z |
hierarchy_top_id |
ELV024123129 |
dewey-sort |
14 |
id |
ELV034439617 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV034439617</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625200908.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.cose.2015.05.006</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2015006000002.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV034439617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0167-4048(15)00070-X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">570</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">550</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">44.68</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alsmadi, Izzat</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security of Software Defined Networks: A survey</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">30</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Networking</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Network security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software defined networking</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software Defined Security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Dianxiang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">LaFrentz, Benjamin R. ELSEVIER</subfield><subfield code="t">Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae</subfield><subfield code="d">2016transfer abstract</subfield><subfield code="d">the international journal devoted to the study of the technical and managerial aspects of computer security</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV024123129</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:53</subfield><subfield code="g">year:2015</subfield><subfield code="g">pages:79-108</subfield><subfield code="g">extent:30</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.cose.2015.05.006</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">44.68</subfield><subfield code="j">Gerontologie</subfield><subfield code="j">Geriatrie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">53</subfield><subfield code="j">2015</subfield><subfield code="h">79-108</subfield><subfield code="g">30</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
author |
Alsmadi, Izzat |
spellingShingle |
Alsmadi, Izzat ddc 004 ddc 570 ddc 550 ddc 610 bkl 44.68 Elsevier Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security Security of Software Defined Networks: A survey |
authorStr |
Alsmadi, Izzat |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV024123129 |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science 570 - Life sciences; biology 550 - Earth sciences 610 - Medicine & health |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
004 004 DE-600 570 VZ 550 VZ 610 VZ 44.68 bkl Security of Software Defined Networks: A survey Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security Elsevier |
topic |
ddc 004 ddc 570 ddc 550 ddc 610 bkl 44.68 Elsevier Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security |
topic_unstemmed |
ddc 004 ddc 570 ddc 550 ddc 610 bkl 44.68 Elsevier Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security |
topic_browse |
ddc 004 ddc 570 ddc 550 ddc 610 bkl 44.68 Elsevier Networking Elsevier Network security Elsevier Security Elsevier Software defined networking Elsevier Software Defined Security |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
d x dx |
hierarchy_parent_title |
Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae |
hierarchy_parent_id |
ELV024123129 |
dewey-tens |
000 - Computer science, knowledge & systems 570 - Life sciences; biology 550 - Earth sciences & geology 610 - Medicine & health |
hierarchy_top_title |
Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV024123129 |
title |
Security of Software Defined Networks: A survey |
ctrlnum |
(DE-627)ELV034439617 (ELSEVIER)S0167-4048(15)00070-X |
title_full |
Security of Software Defined Networks: A survey |
author_sort |
Alsmadi, Izzat |
journal |
Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae |
journalStr |
Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works 500 - Science 600 - Technology |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
zzz |
container_start_page |
79 |
author_browse |
Alsmadi, Izzat |
container_volume |
53 |
physical |
30 |
class |
004 004 DE-600 570 VZ 550 VZ 610 VZ 44.68 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Alsmadi, Izzat |
doi_str_mv |
10.1016/j.cose.2015.05.006 |
dewey-full |
004 570 550 610 |
title_sort |
security of software defined networks: a survey |
title_auth |
Security of Software Defined Networks: A survey |
abstract |
Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. |
abstractGer |
Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. |
abstract_unstemmed |
Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U |
title_short |
Security of Software Defined Networks: A survey |
url |
https://doi.org/10.1016/j.cose.2015.05.006 |
remote_bool |
true |
author2 |
Xu, Dianxiang |
author2Str |
Xu, Dianxiang |
ppnlink |
ELV024123129 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth |
doi_str |
10.1016/j.cose.2015.05.006 |
up_date |
2024-07-06T21:07:24.022Z |
_version_ |
1803865338962509824 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV034439617</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625200908.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.cose.2015.05.006</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2015006000002.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV034439617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0167-4048(15)00070-X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">570</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">550</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">44.68</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alsmadi, Izzat</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security of Software Defined Networks: A survey</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">30</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper provides an extensive survey on SDN security. We discuss the security threats to SDN according to their effects, i.e., Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege. We also review a wide range of SDN security controls, such as firewalls, IDS/IPS, access control, auditing, and policy management. We describe several pathways of how SDN is evolving.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Networking</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Network security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software defined networking</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software Defined Security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Dianxiang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">LaFrentz, Benjamin R. ELSEVIER</subfield><subfield code="t">Controlled challenge experiment demonstrates substantial additive genetic variation in resistance of Nile tilapia (Oreochromis niloticus) to Streptococcus iniae</subfield><subfield code="d">2016transfer abstract</subfield><subfield code="d">the international journal devoted to the study of the technical and managerial aspects of computer security</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV024123129</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:53</subfield><subfield code="g">year:2015</subfield><subfield code="g">pages:79-108</subfield><subfield code="g">extent:30</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.cose.2015.05.006</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">44.68</subfield><subfield code="j">Gerontologie</subfield><subfield code="j">Geriatrie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">53</subfield><subfield code="j">2015</subfield><subfield code="h">79-108</subfield><subfield code="g">30</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
score |
7.399766 |