Mar 22, 2021 · Abstract: We consider a network security and configuration management problem of locating service controllers so as to maximize availability ...
Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements · Computer Science, Engineering.
The model is based on a novel concept of a probabilistic measure of 'after-attack' network availability. The proposed measure includes an estimated controller ...
Abstract. We consider a network security and configuration management problem of locating service controllers so as to maximize availability of services in case ...
We consider a network security and configuration management problem of locating service controllers so as to maximize availability of services in case of ...
We consider a network security and configuration management problem of locating service controllers so as to maximize availability of services in case of ...
This paper deals with targeted attacks on the nodes of a communication network. We present an optimization approach that may be useful for the network ...
People also ask
What is an attack against the availability of a network system?
Which methodologies can you use to defend a network?
The key component of our success measurement model is the probabilistic definition of the expected chance of a successful attack against any node in the attack ...
Composition of vulnerabilities can be modeled using probabilistic attack graphs, which show all paths of attacks that allow incremental network penetration.
In this paper, we present an optimization approach which can be used by the SDN network operator to properly locate the controllers.