GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment
Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to...
Ausführliche Beschreibung
Autor*in: |
Yuming, Liu [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2022transfer abstract |
---|
Übergeordnetes Werk: |
Enthalten in: Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications - Khadilkar, Aditi ELSEVIER, 2014, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:71 ; year:2022 ; pages:0 |
Links: |
---|
DOI / URN: |
10.1016/j.jisa.2022.103354 |
---|
Katalog-ID: |
ELV059809124 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV059809124 | ||
003 | DE-627 | ||
005 | 20230626054029.0 | ||
007 | cr uuu---uuuuu | ||
008 | 221219s2022 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.jisa.2022.103354 |2 doi | |
028 | 5 | 2 | |a /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001987.pica |
035 | |a (DE-627)ELV059809124 | ||
035 | |a (ELSEVIER)S2214-2126(22)00199-5 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 660 |q VZ |
082 | 0 | 4 | |a 630 |a 640 |a 580 |q VZ |
084 | |a BIODIV |q DE-30 |2 fid | ||
084 | |a 42.00 |2 bkl | ||
100 | 1 | |a Yuming, Liu |e verfasserin |4 aut | |
245 | 1 | 0 | |a GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment |
264 | 1 | |c 2022transfer abstract | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. | ||
520 | |a Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. | ||
700 | 1 | |a Yong, Wang |4 oth | |
700 | 1 | |a Hao, Feng |4 oth | |
700 | 1 | |a Zeyu, Wang |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier |a Khadilkar, Aditi ELSEVIER |t Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |d 2014 |g Amsterdam [u.a.] |w (DE-627)ELV028549872 |
773 | 1 | 8 | |g volume:71 |g year:2022 |g pages:0 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.jisa.2022.103354 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a FID-BIODIV | ||
912 | |a GBV_ILN_99 | ||
912 | |a GBV_ILN_165 | ||
936 | b | k | |a 42.00 |j Biologie: Allgemeines |q VZ |
951 | |a AR | ||
952 | |d 71 |j 2022 |h 0 |
author_variant |
l y ly |
---|---|
matchkey_str |
yumingliuyongwanghaofengzeyuwang:2022----:wfaoepcefradnvrfctomcaimaeogtwyis |
hierarchy_sort_str |
2022transfer abstract |
bklnumber |
42.00 |
publishDate |
2022 |
allfields |
10.1016/j.jisa.2022.103354 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001987.pica (DE-627)ELV059809124 (ELSEVIER)S2214-2126(22)00199-5 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Yuming, Liu verfasserin aut GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment 2022transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Yong, Wang oth Hao, Feng oth Zeyu, Wang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:71 year:2022 pages:0 https://doi.org/10.1016/j.jisa.2022.103354 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 71 2022 0 |
spelling |
10.1016/j.jisa.2022.103354 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001987.pica (DE-627)ELV059809124 (ELSEVIER)S2214-2126(22)00199-5 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Yuming, Liu verfasserin aut GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment 2022transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Yong, Wang oth Hao, Feng oth Zeyu, Wang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:71 year:2022 pages:0 https://doi.org/10.1016/j.jisa.2022.103354 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 71 2022 0 |
allfields_unstemmed |
10.1016/j.jisa.2022.103354 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001987.pica (DE-627)ELV059809124 (ELSEVIER)S2214-2126(22)00199-5 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Yuming, Liu verfasserin aut GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment 2022transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Yong, Wang oth Hao, Feng oth Zeyu, Wang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:71 year:2022 pages:0 https://doi.org/10.1016/j.jisa.2022.103354 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 71 2022 0 |
allfieldsGer |
10.1016/j.jisa.2022.103354 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001987.pica (DE-627)ELV059809124 (ELSEVIER)S2214-2126(22)00199-5 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Yuming, Liu verfasserin aut GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment 2022transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Yong, Wang oth Hao, Feng oth Zeyu, Wang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:71 year:2022 pages:0 https://doi.org/10.1016/j.jisa.2022.103354 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 71 2022 0 |
allfieldsSound |
10.1016/j.jisa.2022.103354 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001987.pica (DE-627)ELV059809124 (ELSEVIER)S2214-2126(22)00199-5 DE-627 ger DE-627 rakwb eng 660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl Yuming, Liu verfasserin aut GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment 2022transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. Yong, Wang oth Hao, Feng oth Zeyu, Wang oth Enthalten in Elsevier Khadilkar, Aditi ELSEVIER Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications 2014 Amsterdam [u.a.] (DE-627)ELV028549872 volume:71 year:2022 pages:0 https://doi.org/10.1016/j.jisa.2022.103354 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 42.00 Biologie: Allgemeines VZ AR 71 2022 0 |
language |
English |
source |
Enthalten in Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications Amsterdam [u.a.] volume:71 year:2022 pages:0 |
sourceStr |
Enthalten in Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications Amsterdam [u.a.] volume:71 year:2022 pages:0 |
format_phy_str_mv |
Article |
bklname |
Biologie: Allgemeines |
institution |
findex.gbv.de |
dewey-raw |
660 |
isfreeaccess_bool |
false |
container_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
authorswithroles_txt_mv |
Yuming, Liu @@aut@@ Yong, Wang @@oth@@ Hao, Feng @@oth@@ Zeyu, Wang @@oth@@ |
publishDateDaySort_date |
2022-01-01T00:00:00Z |
hierarchy_top_id |
ELV028549872 |
dewey-sort |
3660 |
id |
ELV059809124 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV059809124</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626054029.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221219s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jisa.2022.103354</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001987.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV059809124</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S2214-2126(22)00199-5</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">660</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">630</subfield><subfield code="a">640</subfield><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yuming, Liu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yong, Wang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hao, Feng</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zeyu, Wang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Khadilkar, Aditi ELSEVIER</subfield><subfield code="t">Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications</subfield><subfield code="d">2014</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV028549872</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:71</subfield><subfield code="g">year:2022</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jisa.2022.103354</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_99</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.00</subfield><subfield code="j">Biologie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">71</subfield><subfield code="j">2022</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
author |
Yuming, Liu |
spellingShingle |
Yuming, Liu ddc 660 ddc 630 fid BIODIV bkl 42.00 GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment |
authorStr |
Yuming, Liu |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV028549872 |
format |
electronic Article |
dewey-ones |
660 - Chemical engineering 630 - Agriculture & related technologies 640 - Home & family management 580 - Plants (Botany) |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment |
topic |
ddc 660 ddc 630 fid BIODIV bkl 42.00 |
topic_unstemmed |
ddc 660 ddc 630 fid BIODIV bkl 42.00 |
topic_browse |
ddc 660 ddc 630 fid BIODIV bkl 42.00 |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
w y wy f h fh w z wz |
hierarchy_parent_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
hierarchy_parent_id |
ELV028549872 |
dewey-tens |
660 - Chemical engineering 630 - Agriculture 640 - Home & family management 580 - Plants (Botany) |
hierarchy_top_title |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV028549872 |
title |
GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment |
ctrlnum |
(DE-627)ELV059809124 (ELSEVIER)S2214-2126(22)00199-5 |
title_full |
GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment |
author_sort |
Yuming, Liu |
journal |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
journalStr |
Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
600 - Technology 500 - Science |
recordtype |
marc |
publishDateSort |
2022 |
contenttype_str_mv |
zzz |
container_start_page |
0 |
author_browse |
Yuming, Liu |
container_volume |
71 |
class |
660 VZ 630 640 580 VZ BIODIV DE-30 fid 42.00 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Yuming, Liu |
doi_str_mv |
10.1016/j.jisa.2022.103354 |
dewey-full |
660 630 640 580 |
title_sort |
gwpfv: a novel packet forwarding verification mechanism based on gateways in sdn-based storage environment |
title_auth |
GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment |
abstract |
Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. |
abstractGer |
Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. |
abstract_unstemmed |
Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U FID-BIODIV GBV_ILN_99 GBV_ILN_165 |
title_short |
GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment |
url |
https://doi.org/10.1016/j.jisa.2022.103354 |
remote_bool |
true |
author2 |
Yong, Wang Hao, Feng Zeyu, Wang |
author2Str |
Yong, Wang Hao, Feng Zeyu, Wang |
ppnlink |
ELV028549872 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth |
doi_str |
10.1016/j.jisa.2022.103354 |
up_date |
2024-07-06T23:07:06.791Z |
_version_ |
1803872870641696768 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV059809124</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626054029.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221219s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.jisa.2022.103354</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001987.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV059809124</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S2214-2126(22)00199-5</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">660</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">630</subfield><subfield code="a">640</subfield><subfield code="a">580</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">BIODIV</subfield><subfield code="q">DE-30</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">42.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yuming, Liu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">GwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Aiming at SDN-based storage environment, the integrity and availability of storage service are threatened by many attacks from data plane, such as packet tampering and dropping. While existing packet forwarding verification methods to deal with the sophisticated attacks are extremely limited due to the assumption that all or part of the switches are trusted. In this paper, for the untrusted data plane, a transparent gateway-based packet forwarding verification mechanism, named GwPFV, was designed to mitigate and trace back the attacks, specially utilizing the characteristics of TCP protocol to realize a packet obfuscation method to proactively defend attacks, a fast event-counting method to find attacks, and a path switching method involved with SDN controller to locate malicious switches. Finally, both the effectiveness and security of GwPFV are analyzed in depth. The experiments performed in an SDN-based prototype storage system reveal that it can achieve the security goal with relative low performance overhead.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yong, Wang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hao, Feng</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zeyu, Wang</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Khadilkar, Aditi ELSEVIER</subfield><subfield code="t">Models of agglomerate growth in fluidized bed reactors: Critical review, status and applications</subfield><subfield code="d">2014</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV028549872</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:71</subfield><subfield code="g">year:2022</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.jisa.2022.103354</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-BIODIV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_99</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_165</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">42.00</subfield><subfield code="j">Biologie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">71</subfield><subfield code="j">2022</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
score |
7.3992815 |