scholarly journals Detection and Mitigation of MITM Attack in Software Defined Networks

Author(s):  
Saritakumar N ◽  
Anusuya K.V ◽  
Balasaraswathi B
2017 ◽  
Vol 9 (1) ◽  
pp. 30-35
Author(s):  
Sunderi Pranata ◽  
Hargyo Tri Nugroho ◽  
Hirofumi Yamaki

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection.  Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP


2018 ◽  
Vol 41 ◽  
pp. 117-123
Author(s):  
Prakash Dey ◽  
Raghvendra Singh Rohit ◽  
Avishek Adhikari
Keyword(s):  

Author(s):  
Ian Vilar Bastos ◽  
Vinicius Correa Ferreira ◽  
Debora Christina Muchaluat-Saade ◽  
Celio Vinicius Neves de Albuquerque ◽  
Igor Monteiro Moraes

Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5042
Author(s):  
Tomasz Nycz ◽  
Tadeusz Czachórski ◽  
Monika Nycz

The increasing use of Software-Defined Networks brings the need for their performance analysis and detailed analytical and numerical models of them. The primary element of such research is a model of a SDN switch. This model should take into account non-Poisson traffic and general distributions of service times. Because of frequent changes in SDN flows, it should also analyze transient states of the queues. The method of diffusion approximation can meet these requirements. We present here a diffusion approximation of priority queues and apply it to build a more detailed model of SDN switch where packets returned by the central controller have higher priority than other packets.


2016 ◽  
Vol 51 (6) ◽  
pp. 402-415 ◽  
Author(s):  
Ahmed El-Hassany ◽  
Jeremie Miserez ◽  
Pavol Bielik ◽  
Laurent Vanbever ◽  
Martin Vechev

Sign in / Sign up

Export Citation Format

Share Document