Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4
In Software-defined network (SDN), the switching devices on the data plane rely on the flow entries issued by controllers to forward packets. Therefore, the correctness of flow entries becomes critical. Howeve...
-
Chapter and Conference Paper
BQSV: Protecting SDN Controller Cluster’s Network Topology View Based on Byzantine Quorum System with Verification Function
In Software-defined network (SDN), SDN applications and administrators rely on the logically centralized view of the network topology to make management decisions. Therefore, the correctness of SDN controller ...