Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4

    In Software-defined network (SDN), the switching devices on the data plane rely on the flow entries issued by controllers to forward packets. Therefore, the correctness of flow entries becomes critical. Howeve...

    Yifang Zhi, Li Yang, Gaolei Yang, Yuehong Zhang in Security and Privacy in Digital Economy (2020)

  2. No Access

    Chapter and Conference Paper

    BQSV: Protecting SDN Controller Cluster’s Network Topology View Based on Byzantine Quorum System with Verification Function

    In Software-defined network (SDN), SDN applications and administrators rely on the logically centralized view of the network topology to make management decisions. Therefore, the correctness of SDN controller ...

    Yifang Zhi, Li Yang, Shui Yu, Jianfeng Ma in Cyberspace Safety and Security (2019)