The hybrid software-defined networks (SDN) architectures are beneficial for a smooth transition and less costly SDN deployment. However, legacy switches and SDN switches coexistence brings new challenges of deployment inconsistency management and security. Security is not well studied for hybrid SDN architecture. In this paper, we study the topology poisoning attacks in hybrid SDN for the first time. We propose new attack vectors for link fabrication in hybrid SDN. The new attack is named 'multi-hop link fabrication,' in which an adversary successfully injects a fake multi-hop link (MHL) by exploiting the link discovery protocols. We presented the Hybrid-Shield, a link verification framework for hybrid SDN link discovery. Hybrid-Shield intr...
Software-defined network (SDN) is an emerging networking paradigm that segregates functionalities of...
Software De fi ned Networking (SDN) is a new approach to networking which provides an abstraction ...
Some typical network attacks,such as link-flooding attack,need to be carried out on critical links b...
Software-defined networking (SDN) is an emerging architecture with a great potentialto foster the de...
Software-Defined Networking (SDN) is a novel network approach that has revolutionised existent netwo...
Networking (SDN) is a new paradigm for configuring, controlling and managing computer networks. In S...
Software-Defined Networking (SDN), unlike traditional networking, provides universal visibility and...
Software Defined Networking (SDN) is an emergent network architecture with a unique feature of decou...
Abstract—Software-Defined Networking (SDN) is a new net-working paradigm that grants a controller an...
Software-Defined Networking (SDN) has found applications in different domains, including wired- and ...
The Software Defined Network (SDN) is a relatively new paradigm that aims to tackle the lack of cent...
Software-defined networking controllers use the OpenFlow discovery protocol (OFDP) to collect networ...
The paper presents a novel paradigm of software-defined network that is significantly different from...
Software-Defined Networking (SDN) is a new networking paradigm that centralizes the control logic fr...
Topology Poisoning can be easily performed by injecting a fake link between SDN switches using a sil...
Software-defined network (SDN) is an emerging networking paradigm that segregates functionalities of...
Software De fi ned Networking (SDN) is a new approach to networking which provides an abstraction ...
Some typical network attacks,such as link-flooding attack,need to be carried out on critical links b...
Software-defined networking (SDN) is an emerging architecture with a great potentialto foster the de...
Software-Defined Networking (SDN) is a novel network approach that has revolutionised existent netwo...
Networking (SDN) is a new paradigm for configuring, controlling and managing computer networks. In S...
Software-Defined Networking (SDN), unlike traditional networking, provides universal visibility and...
Software Defined Networking (SDN) is an emergent network architecture with a unique feature of decou...
Abstract—Software-Defined Networking (SDN) is a new net-working paradigm that grants a controller an...
Software-Defined Networking (SDN) has found applications in different domains, including wired- and ...
The Software Defined Network (SDN) is a relatively new paradigm that aims to tackle the lack of cent...
Software-defined networking controllers use the OpenFlow discovery protocol (OFDP) to collect networ...
The paper presents a novel paradigm of software-defined network that is significantly different from...
Software-Defined Networking (SDN) is a new networking paradigm that centralizes the control logic fr...
Topology Poisoning can be easily performed by injecting a fake link between SDN switches using a sil...
Software-defined network (SDN) is an emerging networking paradigm that segregates functionalities of...
Software De fi ned Networking (SDN) is a new approach to networking which provides an abstraction ...
Some typical network attacks,such as link-flooding attack,need to be carried out on critical links b...