2,606
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      BLOSTER: Blockchain-based System for Detection of Fraudulent Rules in Software-Defined Networks

      Published
      proceedings-article
      , , , , ,
      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)
      Cyber Security Research
      10th-12th September 2019
      Blockchain, Software-Defined Network, OpenFlow
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            September 2019
            September 2019
            : 38-40
            Affiliations
            [0001]King Saud University

            Saudi Arabia
            [0002]USTHB University

            Algeria
            [0003]De Montfort University

            UK
            [0004]Guelma University

            Algeria
            [0005]Guangdong University of Petrochemical Technology

            China
            Article
            10.14236/ewic/icscsr19.5
            8ecebb98-248f-40e8-9c78-36e1d367675b
            © Abdelouahid Derhab et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            6th International Symposium for ICS & SCADA Cyber Security Research 2019
            ICS-CSR
            6
            Athens, Greece
            10th-12th September 2019
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/icscsr19.5
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Blockchain,Software-Defined Network,OpenFlow

            REFERENCES

            1. Software-defined networking: Asurvey, Computer Networks 81 7995 2015

            2. https://www.sdxcentral.com/sdn/definitions/what-is-openflow/

            3. Veriflow:Verifying network-wide invariants in real time, the 10th USENIX Symposium on Networked Systems Design andImplementation (NSDI) 2013 15 27

            4. A security enforcement kernel for OpenFlow networks Proceedings of the first workshop on Hot topics in software defined networks ACM 2012 121 126

            5. FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures Proceedings of the 3rd ACM workshop on Assurable and usable security configuration ACM 2010 37 44

            6. Blockchain technologies for the internet of things: Researchissues and challenges IEEE Internet of Things Journal 6 2 2188 2204 2019

            7. https://www.openstack.org/

            8. https://www.multichain.com/

            9. https://bitcoin.org/en/bitcoin-core/

            10. https://www.jsonrpc.org/specification

            11. https://www.opennetworking.org/onos/

            12. Authflow: authentication andaccess control mechanism for software defined networking, Annals of Telecommunications 71 11-12 607 615 2016

            Comments

            Comment on this article