Software-Defined Networking—Imposed Security Measures Over Vulnerable Threats and Attacks

Author(s):  
Umesh Kumar ◽  
Swapnesh Taterh ◽  
Nithesh Murugan Kaliyamurthy
2019 ◽  
Vol 10 (4) ◽  
pp. 60-67
Author(s):  
Nitheesh Murugan Kaliyamurthy ◽  
Swapnesh Taterh ◽  
Suresh Shanmugasundaram

Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.


2019 ◽  
Author(s):  
Marjin Martens ◽  
Ralf De Wolf ◽  
Lieven De Marez
Keyword(s):  

Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


2015 ◽  
Vol 2 (3) ◽  
pp. 1-7
Author(s):  
Furqan Jameel ◽  
◽  
Ibrahim Khan ◽  

2020 ◽  
Author(s):  
Е. A. Akunchenko ◽  
S. P. Basalaeva ◽  
M. A. Volkova ◽  
S. I. Gutnik ◽  
P. A. Vyrva ◽  
...  
Keyword(s):  

Author(s):  
G. I. Korshunov ◽  
V. A. Lipatnikov ◽  
A. A. Shevchenko ◽  
V. Y. Malyshev

Introduction:The known methods of adaptive management of information network protection with special security measures are not effective enough in modern conditions, as they only take into account collected and processed data on security events and do not analyze the dynamics of the actions.Purpose:Developing a method of adaptive control of information network protection based on the analysis of violator's actions.Results:A method has been proposed for adaptive management of information network protection. Unlike other known methods, it is based on analyzing the dynamics of the violator's actions and determining the situational confrontation parameters under stochastic uncertainty. The method includes situation monitoring, operational control of the sequence of violator's actions, modeling the attacker's strategy, determining the situational parameters with a reliable prediction of the intrusion strategy. During the analysis, the network administrator receives information about the priority purposes of an intruder, the tools used and the vulnerabilities of the network. This provides an opportunity to promptly take measures to increase the security of the network and avoid its compromise.Practical relevance: Тhis approach allows you to maintain the operation of automated management systems for an organization with integrated structure, taking into account the scaling in planning and making changes to the structure on the background of information confrontation at the required level when multiple threats are changing their dynamics. 


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Sign in / Sign up

Export Citation Format

Share Document