Journal ArticleDOI
Advanced Persistent threats and how to monitor and deter them
TLDR
Traditional defences aimed at keeping known threats out of the network are no longer sufficient against the exploits being used to conduct such attacks and the focus should be on developing a defence in depth strategy that aims to constantly monitor networks and security controls for their effectiveness, explains Colin Tankard of Digital Pathways.About:
This article is published in Network Security.The article was published on 2011-08-01. It has received 346 citations till now. The article focuses on the topics: Advanced persistent threat & Cybercrime.read more
Citations
More filters
Journal ArticleDOI
Software-Defined Networking: A Comprehensive Survey
Diego Kreutz,Fernando M. V. Ramos,Paulo Veríssimo,Christian Esteve Rothenberg,Siamak Azodolmolky,Steve Uhlig +5 more
TL;DR: This paper presents an in-depth analysis of the hardware infrastructure, southbound and northbound application programming interfaces (APIs), network virtualization layers, network operating systems (SDN controllers), network programming languages, and network applications, and presents the key building blocks of an SDN infrastructure using a bottom-up, layered approach.
Posted Content
Software-Defined Networking: A Comprehensive Survey
Diego Kreutz,Fernando M. V. Ramos,Paulo Veríssimo,Christian Esteve Rothenberg,Siamak Azodolmolky,Steve Uhlig +5 more
TL;DR: Software-Defined Networking (SDN) as discussed by the authors is an emerging paradigm that promises to change this state of affairs, by breaking vertical integration, separating the network's control logic from the underlying routers and switches, promoting (logical) centralization of network control, and introducing the ability to program the network.
Journal ArticleDOI
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset
TL;DR: In this paper, the authors proposed a new dataset, called Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks, and evaluated the reliability of the dataset using different statistical and machine learning methods for forensics purposes.
Proceedings ArticleDOI
Towards secure and dependable software-defined networks
TL;DR: This paper describes several threat vectors that may enable the exploit of SDN vulnerabilities and sketches the design of a secure and dependable SDN control platform as a materialization of the concept here advocated.
Journal ArticleDOI
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
Mohamed Abomhara,Geir M. Køien +1 more
TL;DR: This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT devices and services, and to comprehensively understand the threats and attacks on IoT infrastructure.