Software-Defined Network Security

Author(s):  
Ahmed Demirpolat ◽  
Doğanalp Ergenç ◽  
Esref Ozturk ◽  
Yusuf Ayar ◽  
Ertan Onur

The future networks are expected to lead a hyper-connected society with the promise of high social and economic value. The goal is to solve today's network problems and provide satisfactory security. Thus, the future networks require a flexible infrastructure that is secure against cyberattacks. Software defined networking (SDN) can be considered as one of the building blocks of upcoming networking technologies. In this chapter, first, the limitations of today's networks are presented. Then, solutions to secure the networks with SDN components are given. This concept is referred to as “SDN for Security.” While SDN facilitates securing networks in general, it introduces additional challenges, mainly, the vulnerabilities of the SDN components such as the controller have to be addressed. Security for SDN aims at securing SDN assets and is discussed in the sequel. After reading this chapter, readers will obtain a comprehensive overview of the limitations of traditional networks, such as how SDN overcomes those limitations and the security issues thereof.

2011 ◽  
pp. 2047-2063
Author(s):  
Changhua Zhu ◽  
Changxing Pei

Intrusion detection and vulnerability analysis play the same important roles in wireless infrastructure as in wired infrastructure. In this chapter we briefly present the methods and technologies of intrusion detection and vulnerability analysis. Then we give the security issues in various wireless networking technologies, analyze the vulnerability of the enabling technologies for the mobile commerce platform, and propose a distributed wireless intrusion detection & vulnerability analysis (WID&VA) system that can help to address the identified security issues. Finally, we conclude this chapter and discuss the future trends.


Author(s):  
Changhua Zhu ◽  
Changxing Pei

Intrusion detection and vulnerability analysis play the same important roles in wireless infrastructure as in wired infrastructure. In this chapter we briefly present the methods and technologies of intrusion detection and vulnerability analysis. Then we give the security issues in various wireless networking technologies, analyze the vulnerability of the enabling technologies for the mobile commerce platform, and propose a distributed wireless intrusion detection & vulnerability analysis (WID&VA) system that can help to address the identified security issues. Finally, we conclude this chapter and discuss the future trends.


2018 ◽  
Author(s):  
Ram P. Rustagi ◽  
Viraj Kumar

With the rapid increase in the volume of e-commerce, the security of web-based transactions is of increasing concern. A widespread but dangerously incorrect belief among web users is that all security issues are taken care of when a website uses HTTPS (secure HTTP). While HTTPS does provide security, websites are often developed and deployed in ways that make them and their users vulnerable to hackers. In this article we explore some of these vulnerabilities. We first introduce the key ideas and then provide several experiential learning exercises so that readers can understand the challenges and possible solutions to them in a hands-on manner.


Author(s):  
Erin K. Chiou ◽  
Eric Holder ◽  
Igor Dolgov ◽  
Kaleb McDowell ◽  
Lance Menthe ◽  
...  

Global investments in artificial intelligence (AI) and robotics are on the rise, with the results to impact global economies, security, safety, and human well-being. The most heralded advances in this space are more often about the technologies that are capable of disrupting business-as-usual than they are about innovation that advances or supports a global workforce. The Future of Work at the Human-Technology Frontier is one of NSF’s 10 Big Ideas for research advancement. This panel discussion focuses on the barriers and opportunities for a future of human and AI/robot teaming, with people at the center of complex systems that provide social, ethical, and economic value.


2017 ◽  
Vol 864 ◽  
pp. 224-228
Author(s):  
Seung Hyeon You ◽  
Jeong Hwan Lee ◽  
Sung Hoon Oh

This study has developed street lamp lighting device material that was turned on and off by self-power supply without additional power by using the rays of the sun. Lighting devices have been applied with polycarbonate materials that were outstanding with light transmissivity while using LED light and economic value. Lighting devices are easily installed in various places since external power is not necessary. In addition, it also serves as a function of preventing crime by acquiring intensity of illumination in crime-ridden district in the night. Lighting device can also serve as a function of improving fine view in the city by establishing eco-friendly circumstances including parks, areas around shopping district, and housing areas after being manufactured in the form of flowerpot where can grow plants in the future.


Author(s):  
Mikel Mari KARRERA EGIALDE

LABURPENA: Gaur egun, mendien kudeaketa eta baso-politika ingurumeneko eta jasangarritasuneko irizpideetan oinarritzen dira, eta lurraldeko baliabide natural nagusiaren aprobetxamenduari buruzko erabakiak bideratzen dituzte. Hori dela-eta, lurralde-antolamendu ororen markoan, nekazaritzaren, basogintzaren eta abeltzaintzaren arloan jarduten duten eragile publiko eta pribatu guztiek egindako plangintza oinarrizkoa izango da hurrengoa bermatzeko: egun mendia behar bezala aprobetxatuz etorkizuneko belaunaldiei balio sozial eta ekonomiko bera transmititzen dien kudeaketa. RESUMEN: La gestión de los montes y la política forestal se fundamentan, actualmente, en criterios medioambientales y de sostenibilidad que dirigen las decisiones sobre el aprovechamiento del principal recurso natural del territorio. Por ello, en el marco de toda ordenación territorial, la planificación mediante la participación de todos los agentes públicos y privados que operan en el ámbito agrosilvopastoral se erige en instrumento esencial de las orientaciones garantizadoras de una gestión que, aprovechando óptimamente el monte en el presente, transmita ese mismo valor social y económico a las futuras generaciones. ABSTRACT: The management of forests and the forest policy are presently based on enviromental and sustainability criteria which are addressed to the decisions regarding the exploitation of the main natural resource of the territory. Because of it, in the framework of the whole territorial planning, the planning by the participation of all the public and private agents that operate within the agrarian, forest and herding field becomes an essential instrument of the guidelines that guaratee the management which using ideally the forest nowadays give that same social and economic value to the future generations.


2018 ◽  
Vol 189 ◽  
pp. 10015 ◽  
Author(s):  
Karim Zkik ◽  
Said EL Hajji ◽  
Ghizlane Orhanou

The information technology sector has experienced phenomenal growth during recent years. To follow this development many new technologies have emerged to satisfy the expectations of businesses and customers, such as Cloud Computing, mobility, virtualization, Internet of things and big data. Traditional network cannot longer support this growth and suffers more and more in terms of misconfiguration,management and configurations complexity. Software defined network (SDN) architectures can be considered as a big revolution in the field of computer networks, because they offer a centralized control on infrastructure, services and the applications deployed which facilitate configuration and management on the network. The implementation of this type of architecture is not obvious and requires great expertise and good handling and management of network equipment. To remedy this problem the SDN architectures have evolved towards distributed and hybrid architectures. Despites the advantages of using SDN, security issues remain a real obstacle in front of the deployment of this type of architecture. The centralized architecture of this type of networks makes it vulnerable to several types of attacks and intrusions, and the implementation of security equipment generally causes a decrease in performance and increase latency.


2018 ◽  
Vol 2 (1) ◽  
pp. 1-37
Author(s):  
F. Bocken ◽  
E. Brennan ◽  
N. Claessens ◽  
D. Claeys ◽  
S. Debeaussaert ◽  
...  

Abstract Contemporary society is plagued by a number of issues and inconsistencies on both an environmental and a socio-economic level. Reliance on bank loans forces debtors to seek means to repay their debts, thus facilitating the current boundless economic growth in which long-term, environmental considerations typically come second. On the individual level, since virtually nothing is free, everyone has to ensure his or her own livelihood, mostly in the form of wage labour. For fear of poverty, the unemployed must adjust to the needs of the job market and risk not being able to fully explore their potential. Other socio-economic groups also face stigmatisation, and inequality is rampant as a result of the pervasive market-based pricing mechanisms. In view of these issues, it seems unjustified to accept these terms and conditions in the future, especially since the West has to cater to its ageing population and the ensuing pressure this will exert on welfare systems. Therefore, as a transdisciplinary team assisted by various experts and armed with insights from a wide <target target-type="page-num" id="p-2"/>variety of sources, we propose an alternative model of society based on the values of fairness, inclusion and transparency, with the goal of developing a representative systems map for a future, resilient and equitable society. The exact workings of this society are captured by several building blocks, which together endeavour to cover the full range of functions and responsibilities associated with society today, and jointly promote democratisation while guaranteeing equal political representation for all members of society.


Sign in / Sign up

Export Citation Format

Share Document