A Systematic Review on Software Defined Networks Security: Threats and Mitigations

Author(s):  
Yassine Maleh ◽  
Imade Fahd Eddine Fatani ◽  
Khalid El Gholami
2020 ◽  
Vol 28 (6) ◽  
pp. 635-653
Author(s):  
Miguel Ángel Díaz de León Guillén ◽  
Víctor Morales-Rocha ◽  
Luis Felipe Fernández Martínez

Among the service models provided by the cloud, the software as a service (SaaS) model has had the greatest growth. This service model is an attractive option for organizations, as they can transfer part or all of their IT functions to a cloud service provider. However, there is still some uncertainty about deciding to carry out a migration of all data to the cloud, mainly due to security concerns. The SaaS model not only inherits the security problems of a traditional application, but there are unique attacks and vulnerabilities for a SaaS architecture. Additionally, some of the attacks in this environment are more devastating due to nature of shared resources in the SaaS model. Some of these attacks and vulnerabilities are not yet well known to software designers and developers. This lack of knowledge has negative consequences as it can expose sensitive data of users and organizations. This paper presents a rigorous systematic review using the SALSA framework to know the threats, attacks and countermeasures to mitigate the security problems that occur in a SaaS environment. As part of the results of this review, a classification of threats, attacks and countermeasures in the SaaS environment is presented.


2019 ◽  
Author(s):  
Harshitha M R ◽  
Harshitha J S ◽  
Brunda K S ◽  
Shrihari M R

2021 ◽  
Vol 4 (2) ◽  
pp. 1-29
Author(s):  
Moses Ashawa ◽  
Sarah Morris

The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society. This paper presents an analysis of mobile malware evolution between 2000-2020. The paper presents mobile malware types and in-depth infection strategies malware deploys to infect mobile devices. Accordingly, factors that restricted the fast spread of early malware and those that enhance the fast propagation of recent malware are identified. Moreover, the paper discusses and classifies mobile malware based on privilege escalation and attack goals. Based on the reviewed survey papers, our research presents recommendations in the form of measures to cope with emerging security threats posed by malware and thus decrease threats and malware infection rates. Finally, we identify the need for a critical analysis of mobile malware frameworks to identify their weaknesses and strengths to develop a more robust, accurate, and scalable tool from an Android detection standpoint. The survey results facilitate the understanding of mobile malware evolution and the infection trend. They also help mobile malware analysts to understand the current evasion techniques mobile malware deploys


IEEE Network ◽  
2018 ◽  
Vol 32 (4) ◽  
pp. 108-113 ◽  
Author(s):  
Shang Gao ◽  
Zecheng Li ◽  
Bin Xiao ◽  
Guiyi Wei

Author(s):  
Tahira Ali ◽  
Rashid Baloch ◽  
Mohsan Azeem ◽  
Muhammad Farhan ◽  
Sana Naseem ◽  
...  

2019 ◽  
Vol 10 (4) ◽  
pp. 60-67
Author(s):  
Nitheesh Murugan Kaliyamurthy ◽  
Swapnesh Taterh ◽  
Suresh Shanmugasundaram

Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.


2021 ◽  
pp. 1-18
Author(s):  
Ghandi Hessam ◽  
Ghassan Saba ◽  
M. Iyad Alkhayat

The scale of Software Defined Networks (SDN) is expanding rapidly and the demands for security reinforcement are increasing. SDN creates new targets for potential security threats such as the SDN controller and networking devices in the data plane. Violation of data plane integrity might lead to abnormal behaviors of the overall network. In this paper, we propose a new security approach for OpenFlow-based SDN in order to detect violation of switches flow tables integrity and successfully locate the compromised switches online. We cover all aspects of integrity violation including flow rule adding, modifying and removing by an unauthorized entity. We achieve this by using the cookie field in the OpenFlow protocol to put in a suitable digest (hash) value for each flow entry. Moreover, we optimize our method performance by calculating a global digest value for the entire switch’s flow table that decides whether a switch is suspected of being compromised. Our method is also able to determine and handle false alarms that affect the coherence of a corresponding table digest. The implementation is a reactive java module integrated with the Floodlight controller. In addition, we introduce a performance evaluation for three different SDN topologies.


Sign in / Sign up

Export Citation Format

Share Document