Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks

2021 ◽  
Vol 54 (6) ◽  
pp. 1-36
Author(s):  
Bilal Rauf ◽  
Haider Abbas ◽  
Muhammad Usman ◽  
Tanveer A. Zia ◽  
Waseem Iqbal ◽  
...  

Software Defined Networking (SDN) is an evolving technology that decouples the control functionality from the underlying hardware managed by the control plane. The application plane supports programmers to develop numerous applications (such as networking, management, security, etc.) that can even be executed from remote locations. Northbound interface (NBI) bridges the control and application planes to execute the third-party applications business logic. Due to the software bugs in applications and existing vulnerabilities such as illegal function calling, resource exhaustion, lack of trust, and so on, NBIs are susceptible to different attacks. Based on the extensive literature review, we have identified that the researchers and academia have mainly focused on the security of the control plane, data plane, and southbound interface (SBI). NBI, in comparison, has received far less attention. In this article, the security of the least explored, but a critical component of the SDN architecture, i.e., NBI, is analyzed. The article provides a brief overview of SDN, followed by a detailed discussion on the categories of NBI, vulnerabilities of NBI, and threats posed by malicious applications to NBI. Efforts of the researchers to counter malicious applications and NBI issues are then discussed in detail. The standardization efforts for the single acceptable NBI and security requirements of SDN by Open Networking Foundation (ONF) are also presented. The article concludes with the future research directions for the security of a single acceptable NBI.

Author(s):  
Qiang Tang

Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) perform certain search functionalities on the encrypted data. In this chapter, the authors conduct a systematic study on SED schemes. First, they describe three application scenarios and identify the desirable security requirements. Second, they provide two orthogonal categorizations and review the related security models for each category of SED schemes. Third, the authors analyze the practical issues related to SED schemes and identify some future research directions.


2019 ◽  
Vol 11 (1) ◽  
pp. 419-438
Author(s):  
JunJie Wu

Urbanization is taking place at an unprecedented pace and scale in China, India, and many other emerging economies. This will have profound impacts on the world economy and environment. This review provides a critical assessment of the current understanding of the intertwined relationships between agglomeration, economic growth, and environmental quality. We start by providing a brief overview of the extensive literature on the drivers of agglomeration and its economic impact. We then discuss the opposing views on the environmental impact of agglomeration and illustrate the trade-offs involved when choosing among different levels and forms of agglomeration. Finally, we discuss challenges for environmental management in a rapidly urbanizing economy and some lessons learned from history and experiences of urban development and their policy implications. The review concludes with a discussion of key knowledge gaps and future research directions.


2003 ◽  
Vol 45 (1) ◽  
pp. 1-20 ◽  
Author(s):  
Graham Spickett-Jones ◽  
Philip J. Kitchen

This conceptual paper concerns information processing, and focuses on the methods and mechanisms used by marketers and academics in attempting to explore mental processes, particularly regarding perception and cognitive mapping in relation to marketing communications. The paper reviews the extensive literature in this domain, deriving information and models from a wide variety of disciplines including: cognitive information processing, attitudes and attitudinal change, elaboration and receiver involvement, sub-routines and sub-processors, semiotics, cognitive science and psycholinguistics. We conclude by suggesting that each of these disciplines has a role to play in terms of future research direction, and that the field of information processing still provides a rich and fertile basis for significant developments to take place.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ruijun Duan ◽  
Li Guo

As a disruptive emerging technology, the Internet of things (IoT) has rapidly developed, but its privacy risks and security vulnerabilities are still key challenges. The decentralized and distributed architecture of blockchain has the potential to satisfy IoT privacy and security requirements. This gives birth to the new domain of blockchain for IoT (BIoT). BIoT will cause significant transformations across several industries, paving the way for new business models. Based on the Science Citation Index Expanded (SCIE) and Social Sciences Citation Index (SSCI) databases in Web of Science (WoS) Core Collection, this study aims to explore the research trends and cooperation in the field of BIoT using the bibliometric method. The results indicate that the publications in this field have increased significantly from 2016 to 2020, with China and the USA being the most productive and influential countries. Keyword co-occurrence analysis shows that the most important research topics are as follows: security issues, core technologies, application dimensions, and transaction processes. Text mining analysis indicates that future research directions for BloT will focus more on both computing paradigms and key applications. This study will provide researchers with a greater understanding on the state of the art of BIoT and will serve as a reference for researchers engaging in this field to identify their own future research directions.


Author(s):  
Danish Javeed ◽  
Umar MohammedBadamasi

Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area


Author(s):  
Paul B. Paulus ◽  
Jared B. Kenworthy

This chapter reviews the extensive literature on brainstorming to determine potential best practices. It presents the major theoretical perspectives and highlights their relationship to the various factors that influence the effectiveness of brainstorming. It examines the utility of verbal brainstorming, electronic brainstorming, and brainwriting for generation of creative ideas. It evaluates the effects of instructions, breaks, facilitators, training, tapping semantic categories, turnover, and group size. It also notes the gaps that exist in the literature and future research directions. It is clear that there is now considerable evidence to guide effective brainstorming and produce performances in groups that exceed those of comparable sets of solitary brainstormers.


Author(s):  
Peter Kerkhof ◽  
Guda van Noort

Buying online is still perceived as risky. A key strategy of online marketers to increase consumer trust in online ordering is to display privacy and security seals on their web sites. Although research indicates that these Internet seals do not necessarily mean better safety for online consumers, findings of several other studies demonstrated that these safety cues do influence consumer responses. The goal of this chapter is to provide the reader with an overview of findings regarding the persuasiveness of Internet seals and to reflect upon possible explanatory mechanisms for these effects. Future research directions and managerial implications for e-business are provided.


Author(s):  
Mehmet Hasan Eken ◽  
Süleyman Kale

In this chapter, the extent of inefficiency of bank branches in different dimensions is evaluated with slack-based model of data envelopment analysis. Each efficiency dimension reveals the strengths, weaknesses, and improvement capabilities of branches. Multi-dimensional comparison enables the determination of the overall characteristics and the choice of the improvement strategies accordingly. An extensive literature analysis of bank branches and future research directions is also presented.


2021 ◽  
Vol 4 ◽  
Author(s):  
Franziska Boenisch

Machine learning (ML) models are applied in an increasing variety of domains. The availability of large amounts of data and computational resources encourages the development of ever more complex and valuable models. These models are considered the intellectual property of the legitimate parties who have trained them, which makes their protection against stealing, illegitimate redistribution, and unauthorized application an urgent need. Digital watermarking presents a strong mechanism for marking model ownership and, thereby, offers protection against those threats. This work presents a taxonomy identifying and analyzing different classes of watermarking schemes for ML models. It introduces a unified threat model to allow structured reasoning on and comparison of the effectiveness of watermarking methods in different scenarios. Furthermore, it systematizes desired security requirements and attacks against ML model watermarking. Based on that framework, representative literature from the field is surveyed to illustrate the taxonomy. Finally, shortcomings and general limitations of existing approaches are discussed, and an outlook on future research directions is given.


Sign in / Sign up

Export Citation Format

Share Document