Computer and Modernization ›› 2017, Vol. 0 ›› Issue (4): 94-98,104.doi: 10.3969/j.issn.1006-2475.2017.04.019
Previous Articles Next Articles
Received:
2016-09-09
Online:
2017-04-20
Published:
2017-05-08
CLC Number:
YIN Su-kai1, LIU Guang-jie1, LIU Wei-wei1, ZHAI Jiang-tao2, DAI Yue-wei1,2. Design of Multiple-flow Timing Channel in Software-defined[J]. Computer and Modernization, 2017, 0(4): 94-98,104.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2017.04.019
[1] Wendzel S, Zander S, Fechner B, et al. Pattern-based survey and categorization of network covert channel techniques[J]. ACM Computing Surveys, 2015,47(3):Article No. 50. [2] Maurice C, Neumann C, Heen O, et al. C5: Cross-cores cache covert channel[C]// International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2015:46-64. [3] Wu Zhenyu, Xu Zhang, Wang Haining. Whispers in the hyper-space: High-bandwidth and reliable covert channel attacks inside the cloud[J]. IEEE/ACM Transactions on Networking (TON), 2015,23(2):603-615. [4] Wu Jingzheng, Ding Liping, Wu Yanjun, et al. C2Detector: A covert channel detection framework in cloud computing[J]. Security and Communication Networks, 2014,7(3):544-557. [5] Wu Zhenyu, Xu Zhang, Wang Haining. Whispers in the hyper-space: High-speed covert channel attacks in the cloud[C]// Proceedings of the 21st USENIX Conference on Security Symposium. 2012:159-173. [6] Wu Jing zheng, Wang Yongji, Ding Liping, et al. Improving performance of network covert timing channel through huffman coding[C]// The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing. 2012:69-79. [7] Wu Jingzheng, Ding Liping, Wang Yongji, et al. Identification and evaluation of sharing memory covert timing channel in Xen virtual machines[C]// Proceedings of the 4th IEEE International Conference on Cloud Computing. 2011:283-291. [8] Park Younghee, Chang Sang-Yoon, Krishnamurthy L M. Watermarking for detecting freeloader misbehavior in software-defined networks[C]// 2016 International Conference on Computing, Networking and Communications. 2016:1-6. [9] Scott-Hayward S, O’Callaghan G, Sezer S. SDN security: A survey[C]// 2013 IEEE SDN For Future Networks and Services. 2013:1-7. [10]Sezer S, Scott-Hayward S, Chouhan P K, et al. Are we ready for SDN? Implementation challenges for software-defined networks[J]. IEEE Communications Magazine, 2013,51(7):36-43. [11]Shin Seungwon, Gu Guofei. Attacking software-defined networks: A first feasibility study[C]// Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. 2013:165-166. [12]Kreutz D, Ramos F, Verissimo P. Towards secure and dependable software-defined networks[C]// Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. 2013:55-60. [13]Kloti R, Kotronis V, Smith P. OpenFlow: A security analysis[C]// Proceedings of the 21st IEEE International Conference on Network Protocols. 2013:1-6. [14]戴彬,王航远,徐冠,等. SDN安全探讨:机遇与威胁并存[J]. 计算机应用研究, 2014,31(8):2254-2262. [15]Jose T, Kurian J. Survey on SDN security mechanisms[J]. International Journal of Computer Applications, 2015,132(14):.32-35. [16]Hussein A, Elhajj I H, Chehab A, et al. SDN security plane: An architecture for resilient security services[C]// IEEE International Conference on Cloud Engineering Workshop. 2016:54-59. [17]Shah G, Molina A, Blaze M. Keyboards and covert channels[C]// Proceedings of the 15th conference on USENIX Security Symposium. 2006: Article No. 5. |
[1] | LYU Meijing1, NIAN Mei1, ZHANG Jun1, 2, FU Lusen1. Anomaly Detection of Network Traffic Based on Autoencoder [J]. Computer and Modernization, 2024, 0(12): 40-44. |
[2] | XIAO Junbi, QIU Yi. SDN Failure Detection and Recovery Scheme Based on State-aware Data Plane [J]. Computer and Modernization, 2024, 0(12): 116-123. |
[3] | ZHANG Tai1, YAN Zihao2, DUAN Jie2, ZHANG Zhihong2. Information Forwarding Strategy of Internet of Vehicles in Named Data Network [J]. Computer and Modernization, 2024, 0(11): 19-27. |
[4] | DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao. Zero-trust Dynamic Evaluation Method for IoT Terminals [J]. Computer and Modernization, 2024, 0(11): 41-45. |
[5] | WANG Cong1, YANG Wenjuan1, DING Xingwang2. An Aggregation Model of Historical Archive Resources Based on Multimodal#br# Information Fusion [J]. Computer and Modernization, 2024, 0(10): 120-126. |
[6] | MA Huiping1, LI Peng1, 2, HU Sujun1. Security Game Analysis Model of RFID System Based on Bayesian Attack Graph [J]. Computer and Modernization, 2024, 0(07): 93-99. |
[7] | ZHAO Wenbo1, XIANG Dong1, WANG Jiubin2, DENG Yuehui3, ZHANG Wei1, KANG Qian1, LI Yujie1. Infrared Image Segmentation of Electrical Equipment Based on Improved Slime Mould Algorithm and Tsallis Entropy [J]. Computer and Modernization, 2024, 0(06): 70-75. |
[8] | LI Shuang1, 2, YE Ning1, 2, XU Kang1, 2, WANG Su1, WANG Ruchuan1, 2. Edge Computing Unloading Method for Intelligent Elderly Care [J]. Computer and Modernization, 2024, 0(06): 95-102. |
[9] | SU Kaixuan . Network Intrusion Detection Based on Improved XGBoost Model [J]. Computer and Modernization, 2024, 0(06): 109-114. |
[10] | YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2. Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection [J]. Computer and Modernization, 2024, 0(05): 46-54. |
[11] | WANG Dongyue, LIU Hao. Multi-agent Genetic Algorithm Based Cloud Platform Anti-fake Data Injection Attack Method [J]. Computer and Modernization, 2024, 0(04): 21-26. |
[12] | YOU Jiajing1, 2, HE Yueshun1, HE Linlin1, ZHONG Hailong1, 2. Encryption Traffic Classification Method Based on AHP-CNN [J]. Computer and Modernization, 2024, 0(04): 83-87. |
[13] | ZHU Yong-shi, YANG Zi-yi, ZHAO Liang-ju, YAO Rui-chu. Volume-hiding Dynamic Encrypted Multi-maps [J]. Computer and Modernization, 0, (): 114-120. |
[14] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
[15] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||