Cargando…
A decoy chain deployment method based on SDN and NFV against penetration attack
Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) me...
Autores principales: | Zhao, Qi, Zhang, Chuanhao, Zhao, Zheng |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5720676/ https://www.ncbi.nlm.nih.gov/pubmed/29216257 http://dx.doi.org/10.1371/journal.pone.0189095 |
Ejemplares similares
-
SDN/NFV Introduction/Demo Session
por: CERN. Geneva
Publicado: (2018) -
Guide to security in SDN and NFV: challenges, opportunities, and applications
por: Zhu, Shao Ying, et al.
Publicado: (2017) -
Network functions virtualization (NFV) with a touch of SDN
por: Chayapathi, Rajendra, et al.
Publicado: (2017) -
Foundations of modern networking: SDN, NFV, QoE, IoT, and Cloud
por: Stallings, William, et al.
Publicado: (2016) -
Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems
por: Molina Zarca, Alejandro, et al.
Publicado: (2020)