-
Is "An attacker can impersonate the role of the SDN controller in the network. An attacker can impersonate the role of another SDN controller in the network." an intended threat? I feel like this shou…
erahn updated
7 months ago
-
root@jack:/home/pox# python2.7 ./pox.py forwarding.l3_learning_editted_final.py
Traceback (most recent call last):
File "./pox.py", line 43, in
from pox.boot import boot
File "/home/pox/p…
-
This item does not feel well defined: "The SDN Controller shall provide a moving target defense mechanism (MTD) that protects the network from attacks by using dynamic network configuration."
I can…
erahn updated
6 months ago
-
Should we be using LLDP capacity type to identify whether attached device is an endpoint or a Network. For example: Switch (bridge - type =3) or Endpoint (Station - type = 8). This will help in mult…
-
**Additional context**
This stack appears to be very similar in its data flow and analysis semantic to the Skydive platform, used to discover/map/manage complex SDN environments such as OpenStack dep…
-
While I added this to #183 (**App Roadmap**), I think it will be better to create „issue“ addressing this.
I was looking for rices on **https://reddit.com/r/unixporn** and I accidentally stumbled u…
-
This github project says there are 15 contributors yet the sum total of "documentation" is 2 pages.
1 page is the GitHub Readme.md
which is almost nothing
1 page is the Meshbird webpage: https…
-
As an SCS Developer, I want a technical concept designed so that I know how to implement it.
## Definition of Ready:
- [ ] User Story is small enough to be finished within one sprint
- [ ] User…
-
Everyone:
We have accumulated extensive experience from the CYFS project, including the design of the next-generation HTTP protocol, the comprehensive design and implementation of a P2P protocol, …
-
- [ ] Make a Chapter6.md file
- [ ] Create a summary in the .md file