Analysis and a Defense Method for Overflow Vulnerability of Flow Tables in Software Defined Networks | |
Zhou, Yadong; Chen, Kaiyue; Leng, Junyuan; Hu, Chengchen | |
刊名 | Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University |
2017 | |
卷号 | 51页码:53-58 |
关键词 | Aggregation rate Attack packets Defense method Flow tables Overflow attacks Packing optimization Route aggregations |
ISSN号 | 0253-987X |
URL标识 | 查看原文 |
内容类型 | 期刊论文 |
URI标识 | http://www.corc.org.cn/handle/1471x/2924616 |
专题 | 西安交通大学 |
推荐引用方式 GB/T 7714 | Zhou, Yadong,Chen, Kaiyue,Leng, Junyuan,et al. Analysis and a Defense Method for Overflow Vulnerability of Flow Tables in Software Defined Networks[J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University,2017,51:53-58. |
APA | Zhou, Yadong,Chen, Kaiyue,Leng, Junyuan,&Hu, Chengchen.(2017).Analysis and a Defense Method for Overflow Vulnerability of Flow Tables in Software Defined Networks.Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University,51,53-58. |
MLA | Zhou, Yadong,et al."Analysis and a Defense Method for Overflow Vulnerability of Flow Tables in Software Defined Networks".Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University 51(2017):53-58. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论