An Approach for Supervising the Security Threats using Software Defined Networks

2019 ◽  
Author(s):  
Harshitha M R ◽  
Harshitha J S ◽  
Brunda K S ◽  
Shrihari M R
IEEE Network ◽  
2018 ◽  
Vol 32 (4) ◽  
pp. 108-113 ◽  
Author(s):  
Shang Gao ◽  
Zecheng Li ◽  
Bin Xiao ◽  
Guiyi Wei

2019 ◽  
Vol 10 (4) ◽  
pp. 60-67
Author(s):  
Nitheesh Murugan Kaliyamurthy ◽  
Swapnesh Taterh ◽  
Suresh Shanmugasundaram

Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.


2021 ◽  
pp. 1-18
Author(s):  
Ghandi Hessam ◽  
Ghassan Saba ◽  
M. Iyad Alkhayat

The scale of Software Defined Networks (SDN) is expanding rapidly and the demands for security reinforcement are increasing. SDN creates new targets for potential security threats such as the SDN controller and networking devices in the data plane. Violation of data plane integrity might lead to abnormal behaviors of the overall network. In this paper, we propose a new security approach for OpenFlow-based SDN in order to detect violation of switches flow tables integrity and successfully locate the compromised switches online. We cover all aspects of integrity violation including flow rule adding, modifying and removing by an unauthorized entity. We achieve this by using the cookie field in the OpenFlow protocol to put in a suitable digest (hash) value for each flow entry. Moreover, we optimize our method performance by calculating a global digest value for the entire switch’s flow table that decides whether a switch is suspected of being compromised. Our method is also able to determine and handle false alarms that affect the coherence of a corresponding table digest. The implementation is a reactive java module integrated with the Floodlight controller. In addition, we introduce a performance evaluation for three different SDN topologies.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


Sign in / Sign up

Export Citation Format

Share Document