Articles with "virtual topologies" as a keyword



Photo by markusspiske from unsplash

Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2017.2724239

Abstract: Advanced targeted cyber attacks often rely on reconnaissance missions to gather information about potential targets, their characteristics and location to identify vulnerabilities in a networked environment. Advanced network scanning techniques are often used for this… read more here.

Keywords: information; system; network; virtual topologies ... See more keywords