|
[1] Open Networking Foundation, available at: https://www.opennetworking.org/ [2] N. McKeown et al., “OpenFlow: Enabling Innovation in. Campus Networks,” ACM SIGCOMM Computer. Commun. Rev., vol. 38, no. 2, Apr. 2008, pp. 69-74. [3] Cloud Computing Security Considerations, A Microsoft Perspective, Microsoft Whitepaper, 2010, available at: http://www.microsoft.com/malaysia/ea/whitepapers.aspx [4] J. Brodkin, Gartner: Seven cloud-computing security risks, available at: http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853 [5] Cloud Computing: Benefits, Risks and Recommendations for Information Security, ENISA Report, 2009, available at: http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-riskassessment [6] Cloud Security Alliance, “Top Threats to Cloud Computing v1.0”, Mar. 2010, available at: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf [7] Amazon EC2, available at: http://aws.amazon.com/cn/ec2/ [8] Microsoft Azure, available at: https://azure.microsoft.com/en-us/ [9] "Amazon ec2 sip brute force attacks on rise", available at: http://www.voiptechchat.com/voip/457/amazon-ec2-sipbrute-force-attacks-on-rise/ [10] "Sip attacks from amazon ec2 cloud continue", available at: http://www.voiptechchat.com/voip/538/sip-attacks-fromamazon-ec2-cloud-continue/ [11] S. Scott-Hayward, G. O’Callaghan, and S. Sezer. SDN Security: A Survey. In IEEE SDN for Future Networks and Services (SDN4FNS), 2013, pp. 1-7, 2013. [12] S. Shin, P.A. Porras, V. Yegneswaran, M.W. Fong, G. Gu, M. Tyson, "FRESCO: Modular Composable Security Services for Software-Defined Networks," in Proceedings of the ISOC Network and Distributed System Security Symposium, San Diego, CA, February 2013. [13] Porras, P., et al. A security enforcement kernel for OpenFlow networks. Proceedings of the first workshop on Hot topics in software defined networks. Helsinki, Finland, ACM: 121-126, 2012. [14] Ozcelik, I., et al. DoS Detection is Easier Now. Second GENI Research and Educational Experiment Workshop (GREE), pp. 50-55, 2013. [15] Giotis, K., et al. "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments." Computer Networks 62(0): 122-136, 2014. [16] Chun-Jen Chung; Khatkar, P.; Tianyi Xing; Jeongkeun Lee; Dijiang Huang, "NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems," Dependable and Secure Computing, IEEE Transactions on, vol.10, no.4, pp.198,211, July-Aug. 2013. [17] D. Huang, L. Xu, C. Chung T. Xing, "SnortFlow: A openflow-based Intrusion Prevention System in Cloud Environment," Second GENI Research and Educational Experiment Workshop, pp. 89-92, 2013. [18] C.N. Hoefer and G. Karagiannis, Taxonomy of cloud computing services. In: Proceedings of the 4th IEEE workshop on enabling the future service-oriented Internet (EFSOI’10), Workshop of IEEE GLOBECOM 2010, pp 1345–1350, 2010. [19] Marotta, A., et al. An OpenFlow-based architecture for IaaS security. Proceedings of the 3rd International Conference on Application and Theory of Automation in Command and Control Systems. Naples, Italy, ACM: 118-121, 2013. [20] Floodlight. Available: http://www.projectfloodlight.org/ [21] Snort. Available: http://www.snort.org/ [22] Adeeb Alhomoud, Rashid Munir, Jules Pagna Disso, Irfan Awan, A. Al-Dhelaan, Performance Evaluation Study of Intrusion Detection Systems, Procedia Computer Science, Volume 5, 2011, pp. 173-180. [23] CloudStack. Available: http://cloudstack.apache.org/ [24] Pica8 3290 datasheet. Available: http://www.pica8.com/documents/pica8-datasheet-48x1gbe-p3290-p3295.pdf [25] Open vSwitch. Available: http://openvswitch.org/ [26] IRC. Available: http://www.irc.org/ [27] P. Barford and V. Yegneswaran, “An Inside Look at Botnets,” in Special Workshop on Malware Detection, Advances in Information Security, Volume 27, 2007, pp. 171-191. [28] Backdoor.Sdbot. Symantec. Available: http://www.symantec.com/security_response/writeup.jsp?docid=2002-051312-3628-99 [29] HTTP File Server. Available: http://www.rejetto.com/hfs/ [30] OpenFlow 1.3 Spec. Available: https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-spec-v1.3.0.pdf [31] IRC Server. Available: https://help.ubuntu.com/10.04/serverguide/irc-server.html [32] XChat. Available: http://xchat.org/ [33] Nmap. Available: http://nmap.org/ [34] UDP Network Tester. Available: http://startrinity.com/VoIP/NetworkTester/NetworkTester.aspx [35] Taiwan Anti-Botnet Project. Available: http://www.anti-botnet.edu.tw/ [36] Third-party packet trace. Available: http://contagiodump.blogspot.tw/2013/04/collection-of-pcap-files-from-malware.html [37] Trend Micro NetKeeper IPS. Available: http://www.trendmicro.tw/tw/enterprise/broadweb-ips/netkeeper/ [38] P. Mell, K. Scarfone, and S. Romanosky, “Common Vulnerability Scoring System (CVSS),” http://www.first.org/cvss/cvss-guide.html, May 2010. [39] National Institute of Standards and Technology, “National Vulnerability Database, NVD,” http://nvd.nist. gov, 2012. [40] Mitre Corporation, “Common Vulnerabilities and Exposures, CVE,” http://cve.mitre.org/, 2012. [41] M. Tupper and A. Zincir-Heywood, “VEA-bility Security Metric: A Network Security Analysis Tool,” Proc. IEEE Third Int’l Conf. Availability, Reliability and Security (ARES ’08), pp. 950-957, Mar. 2008. [42] OpenDaylight. Available: http://www.opendaylight.org/ [43] Ryu. Available: http://osrg.github.io/ryu/
|