SlideShare a Scribd company logo
ATTACKING	SDN	INFRASTRUCTURE:	
ARE	WE	READY	FOR	THE	NEXT-GEN	NETWORKING?
Changhoon Yoon,	Seungsoo	Lee
{chyoon87,	lss365}@kaist.ac.kr
1. About	us
2. Software-defined	Networking	(SDN)	?
3. Attacking	SDN	Infrastructure
• Scenario:	Attacking	Software-Defined	Data	Center	(SDDC)
• Vulnerabilities
4. Recent	work	on	SDN	security
5. Conclusion
Contents
About	us
Seungsoo Lee
- PhD	student	at	KAIST
- Project	DELTA
- Assistant	Professor	of	EE	dept.	at	KAIST
- Research	Associate	of	
Open	Networking	Foundation	(ONF)
- Leading	Network	and	System	Security	Lab.	
Changhoon Yoon
- PhD	student	at	KAIST
- Project	SM-ONOS
http://nss.kaist.ac.kr
Seungwon Shin
• Too	complicated
• Control	plane	is	implemented	with	complicated	S/W	and	ASIC
• Unstable,	increased	complexity	in	management
• Closed	platform
• Vendor	specific
• Hard	to	modify	(nearly	impossible)
• Hard	to	add	new	functionalities
• Barrier	to	innovation
• New	proposal:	Software	Defined	Networking	(SDN)
• Separate	the	control	plane	from	the	data	plane
Traditional	Networking
Control	Plane
Data	Plane
Legacy	Network	Device
What	is	Software	Defined	Networking	(SDN)?
Northbound	 Interface
Core	Services
Southbound	 Interface
Storage
App	1 App	2 App	3 App	N
SDN Controller
Data	Plane
Control	Plane• Centralized	network	management
• Via	global	network	view
• Programmable	network
• Flexible	and	dynamic	network	control
• useful,	innovative	SDN	applications
• CAPEX,	OPEX	reduction
• Commodity	servers	and	switches
Basic	SDN	operation
Controller
L2	Forwarding
Host	A Host	B
SDN	Switch
Flow	Table
Host	Aà Host	B FWD
MATCH ACTION
Data	Center	Network	Design
Servers
Leaf
Edge
Spine
Border
Leaf
East-West	Traffic
• Today’s	Data	Center	involves	a	LOT	of	Virtual	Machines	(VMs)
• “Leaf-Spine”	Design
• Suitable	for	handling	“East-West”	traffic;	low	latency	&	bottlenecks
• Remaining	challenges
• Increased	complexity	– frequent	VM	migrations,	a	large	number	of	links
• Expensive	to	scale	&	maintain
Software-Defined	Data	Center	(SDDC)
Servers
Leaf
SDDC
Control Plane
Edge
Spine
Border
Leaf
Distributed NOS
Node #1
Distributed NOS
Node #2
Distributed NOS
Node #3
• Highly	available	&	scalable	control	plane
• Distributed	SDN	controller
• VMs	to	host	controller	nodes
• Low	complexity
• Global	network	view	+	Network	programmability
• Low	cost
• Commodity	servers	&	switches	
• Centralized	&	automated	management
Attack	Vectors
Misconfiguration
- Direct	access	to	critical	SDN	components
- CLI/GUI/SSH	etc.
Malware
- Malicious	libraries/
SDN	applications
Insider(tenant)	attacks
- DoS/Control	plane	saturation	attack	
against	the	NOS	cluster
- Topology	Poisoning
DCN Admin/Operator
Servers
Leaf
SDDC
Control Plane
Edge
Spine
Border
Leaf
Distributed NOS
Node #1
Distributed NOS
Node #2
Distributed NOS
Node #3
Build environment
Update,	 deploy
Update,	 deploy
• Open	Source	SDN	Controller	(NOS)	implementations
• Open	Network	Operating	System	(ONOS)	&	OpenDaylight(ODL)
• Cutting-edge,	distributed	network	operating	systems	(NOS)
• Provide base design for commercial SDN controllerproducts
• Brocade	SDN	Controller	[1]	:	ODL-based	
• Both	are	Maven	projects
• Both	run	on	Karaf OSGi container
SDN	Control	Plane	Components
[1]	http://www.brocade.com/en/products-services/software-networking/sdn-controllers-applications/sdn-controller.html
Attack	Vector:	Misconfiguration
• Remotely	accessible	interfaces
• Remote	SSH	to	NOS	host	machines	
• Karaf container	CLI
• WebConsole,	GUI
• REST	API
• Defenses
• Follow	the	security	guideline	available	here:
• http://docs.opendaylight.org/en/latest/getting-started-
guide/security_considerations.html
• Changing	default	credentials
• Properly	configuring	 Firewall	policies	to	block	remote	access
Attack	Vector:	Malware
• Malware	infection	at	build-time
• Malware	infection	at	runtime
• Compromising	SDN	Control	Plane	at	Build-time
Attack	Vector:	Malware	1
Build environment
Maven
Repository
SDN controller
source code
repository
Automatically
fetch
required components
Fetch source code Build
SDN controller project
source
Maven project build
Deployable
SDN controller package
Deployment environment
Distributed NOS
Node #1
Distributed NOS
Node #2
Distributed NOS
Node #3
Configuration
Compromised	build	 machine
- Manipulated hosts	file
- Manipulated maven	repo.	setting
- Etc.
Compromised	build	 env.	network
- DNS	cache	poisoning	attack
- ARP	spoofing	attack
- Etc.
Rogue
maven repository
Rogue
SDN controller
source code
repository
Deployment environment
Distributed NOS Node #1
Controller
Southbound API
Core Services
Northbound API
App1 App 2 App 3 App 4 App 5
Distributed NOS
Node #2
Distributed NOS
Node #3
• Compromising	SDN	Control	Plane	at Runtime
Attack	Vector:	Malware	2
CLI
REST	
API	
GUI
DCN Admin/Operator
Social	Engineering	attacks
- Phishing	(Spamming,	Distribution	via	Web	(Blogs,	SNS,	etc.)
Repackaging	&	Redistributing	
Can	install
SDN	apps
at	runtime
Malicious	
App
• Malicious	tenants
• Control	plane	saturation	attack	(DoS)	against	the	NOS	cluster	[1]
• Topology	Poisoning	[2]
Attack	Vectors:	Insider	(tenant)	attacks
Servers
Leaf
SDDC
Control Plane
Edge
Spine
Border
Leaf
Distributed NOS
Node #1
Distributed NOS
Node #2
Distributed NOS
Node #3
[1]	Shin,	Seungwon,	and	Guofei Gu.	"Attacking	software-defined	 networks:	A	first	 feasibility	study." Proceedings	of	the	second	ACM	SIGCOMM	workshop	on	Hot	 topics in	software	defined	networking.	ACM,	2013.
[2]	Hong,	Sungmin,	et	al.	"Poisoning	Network	Visibility	 in	Software-Defined	 Networks:	New	Attacks	and	Countermeasures."	 NDSS.	2015.
Attack	Scenario	1
Build environment
SDN controller project
source
Maven project build
Deployable
SDN controller package
Deployment
environment Distributed NOS
Node #1
Distributed NOS
Node #2
Distributed NOS
Node #3
Rogue Maven Repository
reverse shell
Inject a rogue NOS node to the cluster
Compromising	SDN	control	plane	at	build	time	to	launch	arbitrary	SDN	controller	node	injection	attack
Attack	Scenario	2
Compromising	SDN	control	plane	at	runtime	to	launch	stealth	network	performance	attack
Download
DCN Admin/Operator
Third-Party SDN
APP Store
Deployment
environment
Distributed NOS
Node #1
Distributed NOS
Node #2
Distributed NOS
Node #3
Stealthily degrade the
network performance!
Deploy
Manipulate the Leaf-Spine fabric to
affect the overall network performance
DCN
The	Vulnerabilities	(selected	from	the	scenario)
1. No	System	Integrity	Protection	
2. No	authentication	of	NOS	cluster	nodes
3. No	application	access	control
4. Switch	Device	Firmware	Abuse
5. Packet-IN	Flooding
6. Control	Message	Manipulation
7. Eavesdrop
8. Internal	Storage	Manipulation
9. ….
Want	more?
Visit	http://sdnsecurity.org !!
(will	open	in	09/2016)
Vulnerability	1.	No	system	integrity	protection	
• There	is	no	system	integrity	protection for	NOS	components
• Integrity	of	the	CORE	NOS	components	must	be	guaranteed
• Possible	Defenses
- Code	signing
- Integrity	protection	mechanisms	(e.g.	checksum) Distributed NOS
Node #1
Distributed NOS
Node #2
Distributed NOS
Node #3
Maven project build
Deployable
SDN controller package
Configuration
SD-WAN
External
BGP Routers
External
BGP Routers
External
BGP Routers
External
BGP Routers
Distributed NOS
Node #1
Distributed NOS
Node #2
Los Angeles AS
NewYork AS
San Francisco AS
Florida AS
Vulnerability	2.	No	authentication	of	NOS	cluster	nodes
Malicious	NOS
Node
• Possible	Defense
- PKI-based	authentication	for	the	NOS	components
• The	malicious	node	can	completely	take	over	
the	control	of	the	entire	control	plane	and	the	network
Vulnerability	3.	No	application	access	control
Distributed NOS Node #1
SDN-SW 1 SDN-SW 3 SDN-SW 5
SDN-SW 6SDN-SW 4SDN-SW 2
SDN-SW 7 SDN-SW 9
SDN-SW 10SDN-SW 8
Distributed NOS cluster
Controller
Southbound API
Core Services
Northbound API
App1 App 2 App 3 App 4
DCN Admin/Operator
Distributed NOS
Node #3
Distributed NOS
Node #2
Data Plane
Malicious	
App
CLI
SSH
REST	
API	
GUI
[CP-3] Flow Rule Flooding
[CP-2] Flow Table Manipulation
[CP-1] Service Chain Interference
[CP-5] Resource Exhaustion
[CP-6] System Variable Manipulation
[CP-4] Controller Shutdown
[CP-7] Internal Storage Manipulation
[CP-8] Application Eviction
[CP-8] Switch Firmware Abuse
• Possible	Defense
- Policy-based	access	control	for	SDN	application
• SDN	applications	are	granted	very	powerful	authority;	need	to	limit
MATCH ACTION
Software	Table
Vulnerability	4.	Switch	device	firmware	abuse
App	1 App	N
OpenFlow
Switch
Host	A Host	B
Controller
Hardware	Table
IP.HOST	A	->	IP.HOST	B
IP.HOST	B	->	IP.HOST	A
OUT:	FW1
OUT:	FW2
MATCH ACTION
• Packet	matching	strategy:
Hardware-based	vs.	Software-based
App	2
• The	strategy	depends	on	
the	vendor	or	the	firmware	version
[1]	HP.	HP	Switch	 Software	OpenFlow Administrator's	 Guide	K/KA/WB	15.14	
HP	3800	Switch	Match	Chart	[1]
Hardware	match
Software	match
Vulnerability	4.	Switch	device	firmware	abuse
App	1
Malicious	
App
App	N
OpenFlow
Switch
Host	A Host	B
Controller
Hardware	Table
IP.HOST	A	->	IP.HOST	B
IP.HOST	B	->	IP.HOST	A
OUT:	FW1
OUT:	FW2
MATCH ACTION
• Override	IP	matching	flow	rules	
with	MAC	matching	flow	rules!
FLOW_MOD
OUT:	FW1
OUT:	FW2
MATCH ACTION
Software	Table
MAC.HOST	A	->	MAC.HOST	B
MAC.HOST	B	->	MAC.HOST	A
Latency
FLOW_MOD
Network	performance	degradation	
a
2a
X2
• Possible	Defense
- Flow	rule	conflict	detection	&	arbitration
• Delta	(collaborate	with	ONF)	is	a	new	SDN	security	evaluation	framework	
with	two	main	functions	[1]:
1. Automatically	instantiates	known	attack	cases	
against	SDN	elements	across	diverse	environments
2. Assists	in	uncovering	unknown	security	
problems	within	an	SDN	deployment
SDN	Security	Assessment: Project	DELTA
[1]	http://opensourcesdn.org/projects/project-delta-sdn-security-evaluation-framework/
Northbound	Interface
Core	Services
Southbound	 Interface
Storage
App	
Agent
App	2 App	N
SDN Controller
Channel
Agent
Host	Agent
Agent	Manager
Web	UI
• Security-Mode	ONOS
• Inspired	by	Mobile	application	security	mechanisms
• Constrains	ONOS	(SDN)	applications’	behavior
• A	security	policy	per	app
• Detects	and	blocks	
security	policy	violations	at	runtime
SDN	Application	security	policy	enforcement
SB API
Core
NB API
OSGi protection domain
Admin Service
ONOS NB-API permission checker
ONOS App 1
Policy
file
OSGi protection domain
ONOS App 2
Policy
file
Device Manager Host Manager
Service
Provider Service Provider Registry
Providers
Protocols
Network Elements
Security Manager
grant
permissions
A
B B
C
Bundle-level RBACA
App-level RBACB
API-level
permission-based AC
C
parse
SDNSecurity.org
• We	try	to	discover	SDN	specific	vulnerabilities	and	devote	to	systematizing
and	characterizing	all	related	points.
• Currently,	we	have 8 on-going	projects	and 8 finished	projects.	
Application Plane
Control Plane
Data PlaneSDN Switch SDN Switch
SDN Controller
Switch Firmware
HardwareSoftware
Flow Table
Network Operating System
App
Southbound API
Northbound API
App
[A-5] Control Message Abuse
Control Channel
Control Channel
[A-6] Northbound API Abuse
[A-3] Internal Storage Manipulation[A-1] Packet-In Flooding
[A-2] Service Chain Interference
[A-4] Control Message Manipulation
[A-7] Resource Exhaustion
[A-8] System Variable Manipulation
[A-9] System Command Execution
[B-1] Eavesdrop
[B-2] Man-In-The-Middle
[C-1] Flow Rule Flooding
[C-2] Firmware Abuse
[C-3] Control Message Manipulation
[A-10] Network Topology Poisoning
http://sdnsecurity.org
SDN	Vulnerability	Genome	Project
(will	open	in	09/2016)
Final	remarks
• Are	we	ready	for	the	next-gen	networking?
• No,	not	yet	at	least	from	a	security	point	of	view
• A LOT of	work	still	needs	to	be	done	to	improve	the	security	of	SDN.
• Your	urgent	attention	is	needed!
Thank	you

More Related Content

PPTX
BsidesSP: Pentesting in SDN - Owning the Controllers
PDF
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
PDF
SDN Security: Two Sides of the Same Coin
PPTX
Sdn pres v2-Software-defined networks
DOCX
PDF
Sdn&security
PPTX
The Potential Impact of Software Defined Networking SDN on Security
PDF
SDN Security Talk - (ISC)2_3
BsidesSP: Pentesting in SDN - Owning the Controllers
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
SDN Security: Two Sides of the Same Coin
Sdn pres v2-Software-defined networks
Sdn&security
The Potential Impact of Software Defined Networking SDN on Security
SDN Security Talk - (ISC)2_3

What's hot (20)

PDF
Security Advantages of Software-Defined Networking
ODP
OWASP Brisbane - SDN Security
PPT
Security of software defined networking (sdn) and cognitive radio network (crn)
PPTX
SDN - a new security paradigm?
PPTX
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
PPTX
Software defined networking players
PDF
44CON & Ruxcon: SDN security
PPTX
SDN: is it a solution for network security?
PPTX
SDN Analytics & Security
PDF
Incident Response in Cyber-Relevant Time - OpenC2
PPT
NFV Security PPT
DOCX
Nice network intrusion detection and countermeasure
PDF
DDoS Attack Detection & Mitigation in SDN
PDF
2008-03-06 Harris Corp Security Seminar
PPTX
Software Defined Network (SDN)
PDF
Windows Service Hardening
PDF
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
PDF
IDS - Fact, Challenges and Future
PDF
WWT Software-Defined Networking Guide
PPTX
New Threats, New Approaches in Modern Data Centers
Security Advantages of Software-Defined Networking
OWASP Brisbane - SDN Security
Security of software defined networking (sdn) and cognitive radio network (crn)
SDN - a new security paradigm?
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Software defined networking players
44CON & Ruxcon: SDN security
SDN: is it a solution for network security?
SDN Analytics & Security
Incident Response in Cyber-Relevant Time - OpenC2
NFV Security PPT
Nice network intrusion detection and countermeasure
DDoS Attack Detection & Mitigation in SDN
2008-03-06 Harris Corp Security Seminar
Software Defined Network (SDN)
Windows Service Hardening
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IDS - Fact, Challenges and Future
WWT Software-Defined Networking Guide
New Threats, New Approaches in Modern Data Centers
Ad

Viewers also liked (10)

PDF
SDN-ppt-new
PDF
Forecast 2014: Software Defined Networking - What's New?
PPTX
Role of sdn controllers in open stack
PDF
SDN в корпоративных сетях
PPTX
Управление корпоративной сетью на основе SDN-технологий
PPTX
Sdn nov-21-v1.1
PPTX
Универсальный контроллер для сетей WiFI высокой плотности и его интеграция с ...
PPTX
SDN технологии
PDF
Openstack devops challenges
PPTX
Cyber crime and security ppt
SDN-ppt-new
Forecast 2014: Software Defined Networking - What's New?
Role of sdn controllers in open stack
SDN в корпоративных сетях
Управление корпоративной сетью на основе SDN-технологий
Sdn nov-21-v1.1
Универсальный контроллер для сетей WiFI высокой плотности и его интеграция с ...
SDN технологии
Openstack devops challenges
Cyber crime and security ppt
Ad

Similar to Attacking SDN infrastructure: Are we ready for the next gen networking (20)

PPTX
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
PDF
The Finest Penetration Testing Framework for Software-Defined Networks
PDF
Software Defined Networking: A Concept and Related Issues
PDF
A Novel SDN Architecture for IoT Security
PPTX
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
PDF
Tinysec
PDF
Tinysec
PDF
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
PDF
SDN and Security: A Marriage Made in Heaven. Or Not.
PDF
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
DOCX
Software Defined Networking Attacks and Countermeasures .docx
PDF
Task & resource self adaptive
PDF
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...
PDF
Performance Analysis of Wireless Trusted Software Defined Networks
PDF
Too soft[ware defined] networks SD-Wan vulnerability assessment
PDF
SDN and Mininet: Some Basic Concepts
PPTX
240705-랩소개-전산학부-석사신입생.pptx
PPTX
nsx overview with use cases 1.0
DOC
Unified Security Plugin for Opendaylight Controller
PDF
Sdn primer pdf
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
The Finest Penetration Testing Framework for Software-Defined Networks
Software Defined Networking: A Concept and Related Issues
A Novel SDN Architecture for IoT Security
IEEE HPSR 2017 Keynote: Softwarized Dataplanes and the P^3 trade-offs: Progra...
Tinysec
Tinysec
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
SDN and Security: A Marriage Made in Heaven. Or Not.
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
Software Defined Networking Attacks and Countermeasures .docx
Task & resource self adaptive
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...
Performance Analysis of Wireless Trusted Software Defined Networks
Too soft[ware defined] networks SD-Wan vulnerability assessment
SDN and Mininet: Some Basic Concepts
240705-랩소개-전산학부-석사신입생.pptx
nsx overview with use cases 1.0
Unified Security Plugin for Opendaylight Controller
Sdn primer pdf

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Machine learning based COVID-19 study performance prediction
PDF
Advanced IT Governance
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Machine learning based COVID-19 study performance prediction
Advanced IT Governance
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Attacking SDN infrastructure: Are we ready for the next gen networking