scholarly journals Vulnerability of SDN Network Architecture and Proposed Countermeasures on Enhancing Security

2019 ◽  
Vol 8 (4) ◽  
pp. 7197-7201

The current problems raising as a horizon in the computational and networking sector is based on the unimaginable increase of high numbers of users which in turn results in high data traffic, limitations over products which are vendor specific, incurring high expenses in maintaining the existing network. This dilutes a major part of the beneficiaries in the sector to move towards Cloud Networks. All these happenings in the past has quietly increased the risks and challenges in the aspect of security considering both data and the infrastructure accommodating the data. In an attempt to address almost a major portion of the existing above said problems, Software Defined Networking was highly anticipated, however, it was considered as a theoretical approach. After the implementation of SDN networks by industrial giants like Google, the SDN concepts again managed to reach the safer hands of the researchers in the movement of enhancement. A very rapid and high speed research work has been initiated by researchers all around the globe in analysing the risk factors and implementation barricades stated in the Software Defined Networking architecture. The research work focus on adding values to the Quality of Service, Latency, Load Balancing and most importantly the security aspects in various metrics of the Software Defined Networking Architecture. The odd man out architecture of Software Defined Networking by decoupling data and control plane allows the network to be configured and maintained in a real time scenario pertaining to pose a complete view of the network and its flow. The fact that is considered as an advantage itself is a factor of question in the case of security in the overall SDN architecture. This paper focuses on a detailed view of SDN architecture with the existing security feature and continues with the expected threats and classifying the weak points in the SDN. This paper also briefs about the pros and cons of the existing applications in the SDN architecture.

Author(s):  
Vishal Kaushik ◽  
Ajay Sharma ◽  
Ravi Tomar

Software-defined networking (SDN) is an emerging network architecture that facilitates the network administrator to control and manage network behavior dynamically. Different from traditional networks, software-defined networks support dynamic and scalable computing. The dynamic behavior is achieved by decoupling or disassociating the system. The swing of control from tightly bound individual networks to assessable computing devices enables infrastructure abstraction. Due to the abstraction, the network can be considered as a logical or virtual entity. In this chapter, relation between network function virtualization (NFV) and software-defined networking (SDN) has been outlined. This chapter focuses on describing the pros and cons of NFV technologies. network functions virtualization (NFV) was founded under the work of the European Telecommunications Standards Institute (ETSI).


2018 ◽  
Vol 24 (8) ◽  
pp. 5989-5993 ◽  
Author(s):  
T. Narendra Reddy ◽  
S. N Vithun ◽  
Prakash Vinod ◽  
Shrikantha S Rao ◽  
Mervin Herbert

Micro and Nanopositioning systems are widely used in semiconductor, optics, materials science, photonics packaging, optical focusing objectives etc. This paper is focused on development of high bandwidth flexure based stage for nanopositioning requirements. The speed, nano-metric motions and positioning accuracy are limited based on the structural vibrations of the flexure based nanopositioning, non-linear characteristics of the piezo-actuators and control system performance. The research work carried out includes design of complaint mechanisms, fabrication of flexure stages and implementation of closed loop systems to achieve high bandwidth positioning applications. The developed high speed and high bandwidth nanopositioning system are tested for accuracy, linearity and cross talk motions for Nanopositioning applications.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Nitheesh Murugan Kaliyamurthy ◽  
Swapnesh Taterh ◽  
Suresh Shanmugasundaram ◽  
Ankit Saxena ◽  
Omar Cheikhrouhou ◽  
...  

Software-defined networking is an evolving network architecture beheading the traditional network architecture focusing its disadvantages in a limited perspective. A couple of decades before, programming and networking were viewed as different domains which today with the lights of SDN bridging themselves together. This is to overcome the existing challenges faced by the networking domain and an attempt to propose cost-efficient effective and feasible solutions. Changes to the existing network architecture are inevitable considering the volume of connected devices and the data being held together. SDN introduces a decoupled architecture and brings customization within the network making it easy to configure, manage, and troubleshoot. This paper focuses on the evolving network architecture, the software-defined networking. Unlike a generic view on the evolving network, which makes work as a review, this work addresses various perspectives of the architecture leaving it an intermediate work in between the review of the literature and implementation, contributing towards factors like the design, programmability, security, security behaviors, and security lapses. This paper also analyses various weak points of the architecture and evolves the attack vectors in each plane leaving a conclusion to further progress towards identifying the impacts of the attacks and proposing mitigation strategies.


2021 ◽  
Vol 11 (4) ◽  
pp. 1829
Author(s):  
Davide Grande ◽  
Catherine A. Harris ◽  
Giles Thomas ◽  
Enrico Anderlini

Recurrent Neural Networks (RNNs) are increasingly being used for model identification, forecasting and control. When identifying physical models with unknown mathematical knowledge of the system, Nonlinear AutoRegressive models with eXogenous inputs (NARX) or Nonlinear AutoRegressive Moving-Average models with eXogenous inputs (NARMAX) methods are typically used. In the context of data-driven control, machine learning algorithms are proven to have comparable performances to advanced control techniques, but lack the properties of the traditional stability theory. This paper illustrates a method to prove a posteriori the stability of a generic neural network, showing its application to the state-of-the-art RNN architecture. The presented method relies on identifying the poles associated with the network designed starting from the input/output data. Providing a framework to guarantee the stability of any neural network architecture combined with the generalisability properties and applicability to different fields can significantly broaden their use in dynamic systems modelling and control.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Saad M. Hardan ◽  
Ayad A. Abdulkafi ◽  
Saadi Hamad Thalij ◽  
Sherine S. Jumaah

Abstract The continued increase in several mobile applications forces to replace existing limited spectrum indoor radio frequency wireless connections with high-speed ones. Visible light communications (VLC) technology has gained prominence in the development of high data rate transmission for fifth-generation networks. In optical wireless communications, light-emitting diode (LED) transmitters are used in applications that desire mobility as LED divergence enables larger coverage. Since each VLC access point covers a small area, handovers of mobile users are inevitable. Wavelength division multiplexing (WDM) can be used in VLC systems to tackle the above issue and to meet the increasing demand for indoor connectivity with high bit rates. In this paper, a new system architecture for WDM with coded modulated optical in orthogonal frequency division multiplexing (OFDM) VLC system in conjunction with red, green, blue, and yellow (RGBY) LEDs is proposed to reduce the impact of random receiver orientation of indoor mobile users over VLC downlink channels and improves the system’s bit-error-rate (BER) performance. Simulation results show that the proposed method is not affected by the user’s mobility and hence it performs better than other approaches, in terms of BER for all scenarios and at all positions. This study reveals that using WDM-OFDM-VLC with RGBY LEDs to construct a VLC system is very promising.


1989 ◽  
Vol 27 (3) ◽  
pp. 375-394 ◽  
Author(s):  
K. YOUCEF-TOUMI ◽  
A. T. Y. KUO
Keyword(s):  

2020 ◽  
Vol 26 (3) ◽  
pp. 169-183
Author(s):  
Phudit Ampririt ◽  
Yi Liu ◽  
Makoto Ikeda ◽  
Keita Matsuo ◽  
Leonard Barolli ◽  
...  

The Fifth Generation (5G) networks are expected to be flexible to satisfy demands of high-quality services such as high speed, low latencies and enhanced reliability from customers. Also, the rapidly increasing amount of user devices and high user’s requests becomes a problem. Thus, the Software-Defined Network (SDN) will be the key function for efficient management and control. To deal with these problems, we propose a Fuzzy-based SDN approach. This paper presents and compares two Fuzzy-based Systems for Admission Control (FBSAC) in 5G wireless networks: FBSAC1 and FBSAC2. The FBSAC1 considers for admission control decision three parameters: Grade of Service (GS), User Request Delay Time (URDT) and Network Slice Size (NSS). In FBSAC2, we consider as an additional parameter the Slice Priority (SP). So, FBSAC2 has four input parameters. The simulation results show that the FBSAC2 is more complex than FBSAC1, but it has a better performance for admission control.


2020 ◽  
pp. 1-20
Author(s):  
K. Muthamil Sudar ◽  
P. Deepalakshmi

Software-defined networking is a new paradigm that overcomes problems associated with traditional network architecture by separating the control logic from data plane devices. It also enhances performance by providing a highly-programmable interface that adapts to dynamic changes in network policies. As software-defined networking controllers are prone to single-point failures, providing security is one of the biggest challenges in this framework. This paper intends to provide an intrusion detection mechanism in both the control plane and data plane to secure the controller and forwarding devices respectively. In the control plane, we imposed a flow-based intrusion detection system that inspects every new incoming flow towards the controller. In the data plane, we assigned a signature-based intrusion detection system to inspect traffic between Open Flow switches using port mirroring to analyse and detect malicious activity. Our flow-based system works with the help of trained, multi-layer machine learning-based classifier, while our signature-based system works with rule-based classifiers using the Snort intrusion detection system. The ensemble feature selection technique we adopted in the flow-based system helps to identify the prominent features and hasten the classification process. Our proposed work ensures a high level of security in the Software-defined networking environment by working simultaneously in both control plane and data plane.


Sign in / Sign up

Export Citation Format

Share Document