To see the other types of publications on this topic, follow the link: Software defined network security.

Journal articles on the topic 'Software defined network security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software defined network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Siham, Aouad, El Meghrouni Issam, Sabri Yassine, Hilmani Adil, and Maizate Abderrahim. "Security of software defined networks: evolution and challenges." International Journal of Reconfigurable and Embedded Systems (IJRES) 12, no. 3 (2023): 384–91. https://doi.org/10.11591/ijres.v12.i3pp384-391.

Full text
Abstract:
In software-defined networking (SDN), network traffic is managed by software controllers or application programming interfaces (APIs) rather than hardware components. It differs from traditional networks, which use switches and routers to control traffic. Using SDN, you can create and control virtual networks or traditional hardware networks. Furthermore, OpenFlow allows network administrators to control exact network behavior through centralized control of packet forwarding. For these reasons, SDN has advantages over certain security issues, unlike traditional networks. However, most of the e
APA, Harvard, Vancouver, ISO, and other styles
2

Aouad, Siham, Issam El Meghrouni, Yassine Sabri, Adil Hilmani, and Abderrahim Maizate. "Security of software defined networks: evolution and challenges." International Journal of Reconfigurable and Embedded Systems (IJRES) 12, no. 3 (2023): 384. http://dx.doi.org/10.11591/ijres.v12.i3.pp384-391.

Full text
Abstract:
<span>In software-defined networking (SDN), network traffic is managed by software controllers or application programming interfaces (APIs) rather than hardware components. It differs from traditional networks, which use switches and routers to control traffic. Using SDN, you can create and control virtual networks or traditional hardware networks. Furthermore, OpenFlow allows network administrators to control exact network behavior through centralized control of packet forwarding. For these reasons, SDN has advantages over certain security issues, unlike traditional networks. However, m
APA, Harvard, Vancouver, ISO, and other styles
3

Nagarjuna Reddy, Tella, and K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking." International Journal of Engineering & Technology 7, no. 3.12 (2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.

Full text
Abstract:
Software Defined Networking and programmability on network have established themselves as current trends in IT by bringing autonomous operation with dynamic flow to network. Networks must be programmable, and it must be aware of the application in order to operate autonomously. Networks need to evolve to catch up with the current trends without losing their current status and operation, reliability, robustness, or security, and without distorting current investments. SDN is a transpiring network architecture where network control plane is distinguished from data plane and by that the network i
APA, Harvard, Vancouver, ISO, and other styles
4

Waseem, Quadri, Sultan S. Alshamrani, Kashif Nisar, Wan Isni Sofiah Wan Din, and Ahmed Saeed Alghamdi. "Future Technology: Software-Defined Network (SDN) Forensic." Symmetry 13, no. 5 (2021): 767. http://dx.doi.org/10.3390/sym13050767.

Full text
Abstract:
The software-defined networking (SDN) paradigm has recently emerged as a trend to build various protocols, develop more reliable networks, enhance the data flow controlling, and provide security in a much simpler and flexible way. SDN helps to ease management and handle asymmetric connectivity across various nodes. It solves the problems of network and cloud security and hence provides the best solution for the safety of data on the network. Therefore, we feel the urge to research more and provide the basics of SDN forensics, mention its advantages in network especially in the cloud, and prese
APA, Harvard, Vancouver, ISO, and other styles
5

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Full text
Abstract:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing securit
APA, Harvard, Vancouver, ISO, and other styles
6

Petukhov, Andrey N., and Paul L. Pilyugin. "”Common Criteria” and Software Defined Network Security." Modeling and Analysis of Information Systems 26, no. 1 (2019): 134–45. http://dx.doi.org/10.18255/1818-1015-2019-1-134-145.

Full text
Abstract:
«Common criteria» (ISO 15408) is a universally recognized and broadly applicable approach to information security solutions management and evaluation. «Common criteria» leans on developing a shared conceptual basis for key security solution modules including protection profiles and security targets. Conceptual basis development implies defining the following elements: security objectives and assumptions (for the environment and the object), threats and security policies, as well as functional and assurance requirements. The specifics of SDN (software defined network) security solutions is larg
APA, Harvard, Vancouver, ISO, and other styles
7

Tsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (2018): 318. http://dx.doi.org/10.3926/jiem.2534.

Full text
Abstract:
Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several netw
APA, Harvard, Vancouver, ISO, and other styles
8

Salama, Ramiz, Chadi Altrjman, and Fadi Al-Turjman. "Network Security in Architectures for Software Defined Networking (SDN)." NEU Journal for Artificial Intelligence and Internet of Things 4, no. 1 (2025): 37–44. https://doi.org/10.32955/neuaiit202541960.

Full text
Abstract:
SDN (Software Defined Networking) is a new network design that separates the control and dataplanes, allowing for better network management and centralized control. This decoupling makes networks more programmable, scalable, and flexible, which is critical for meeting the changing requirements of modern digital environments. Although SDN streamlines network administration, it also adds new security risks, such as the possibility of centralized control failures, expanded attack surfaces, and vulnerability to multiple network attack types. SDN architectures must include network security to mitig
APA, Harvard, Vancouver, ISO, and other styles
9

Savaliya, Abhishek, Rutvij H. Jhaveri, Qin Xin, Saad Alqithami, Sagar Ramani, and Tariq Ahamed Ahanger. "Securing industrial communication with software-defined networking." Mathematical Biosciences and Engineering 18, no. 6 (2021): 8298–313. http://dx.doi.org/10.3934/mbe.2021411.

Full text
Abstract:
<abstract> <p>Industrial Cyber-Physical Systems (CPSs) require flexible and tolerant communication networks to overcome commonly occurring security problems and denial-of-service such as links failure and networks congestion that might be due to direct or indirect network attacks. In this work, we take advantage of Software-defined networking (SDN) as an important networking paradigm that provide real-time fault resilience since it is capable of global network visibility and programmability. We consider OpenFlow as an SDN protocol that enables interaction between the SDN controller
APA, Harvard, Vancouver, ISO, and other styles
10

Ameen, Ali. "SOFTWARE-DEFINED NETWORKS…A GENERAL SURVEY AND ANALYSIS." Journal of Engineering Science XXV (3) (February 15, 2019): 61–73. https://doi.org/10.5281/zenodo.2557306.

Full text
Abstract:
Technology of Software-defined networks is rapidly evolving in order develop the networks world, hence to provide better connectivity, agility and security to defend the world of cyber information against the ever-evolving security threats and challenges.  This article is totally dedicated for beginners in both the IT world generally and the SDN world specifically as well. Through software-defined networking we can enter a new era of portable network management interface simply by using a mobile app or your smart watch, which gives a great deal of smoothness for network administration, an
APA, Harvard, Vancouver, ISO, and other styles
11

Guo, Xian, Hongbo Xian, Tao Feng, Yongbo Jiang, Di Zhang, and Junli Fang. "An intelligent zero trust secure framework for software defined networking." PeerJ Computer Science 9 (November 17, 2023): e1674. http://dx.doi.org/10.7717/peerj-cs.1674.

Full text
Abstract:
Software-defined networking (SDN) faces many of the same security threats as traditional networks. The separation of the SDN control plane and data plane makes the controller more vulnerable to cyber attacks. The conventional “perimeter defense” network security model cannot prevent lateral movement attacks caused by malicious insider users or hardware and software vulnerabilities. The “zero trust architecture” has become a new security network model to protect enterprise network security. In this article, we propose an intelligent zero-trust security framework IZTSDN for the software-defined
APA, Harvard, Vancouver, ISO, and other styles
12

Mahajan, Yash, and Dr Manish Vyas. "A Review on Security Frameworks for Software Defined Networks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28497.

Full text
Abstract:
The internet of thins (IoT) framework has helped in design of high speed connected networks which include Wide Area Networks (WANs). Cognitive Radio can be considered to be one of the key enablers of high speed data transfer with evolving generation of wireless networks. Cognitive networks find their applications in military and defence as well with the advent of internet of things and its allied applications in military warfare. Cognitive Radio Networks often share common resources such as bandwidth or spectrum among several users or stations. Due to continued sharing of resources, cognitive
APA, Harvard, Vancouver, ISO, and other styles
13

Levterov, Andrii, Hanna Pliekhova, Maryna Kostikova, Nataliia Berezhna, and Anton Okun. "ENHANCING SECURITY IN SOFTWARE-DEFINED NETWORKING THROUGH ROUTING TECHNIQUES EXPLORATION." Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, no. 1 (9) (July 15, 2023): 10–18. http://dx.doi.org/10.20998/2079-0023.2023.01.02.

Full text
Abstract:
In today's world, network security is a key issue of information security. Virtual Networks have become an integral part of modern IT infrastructure, which presents us with challenges in the field of security. One solution to this problem is the use of software-defined networking (SDN), which provides a means to control and manage network traffic. However, as with any technology, SDN has its vulnerabilities that must be considered when deploying it. One of the tools that helps to take into account the vulnerabilities of network infrastructure is the Common Vulnerability Scoring System (CVSS) s
APA, Harvard, Vancouver, ISO, and other styles
14

Kulakov, Y. O., and D. V. Korenko. "Methods of applying artificial intelligence in software-defined networks." Problems of Informatization and Management 1, no. 73 (2023): 23–27. http://dx.doi.org/10.18372/2073-4751.73.17640.

Full text
Abstract:
This work is devoted to the review of artificial intelligence application methods in enterprise networks using SDN technology. The paper examines the features and methods of using AI in these networks, as well as identifies potential problems that may arise.
 The paper provides an overview of the main features of AI in enterprise SDN networks. AI has been found to automate many processes in the network, such as routing, monitoring, bandwidth management, and more. Using AI helps improve network efficiency, reduce costs, and improve security.
 Potential problems that may arise when usi
APA, Harvard, Vancouver, ISO, and other styles
15

Singh, Manisha, Vandana Rathore, Vivek Prasad Patel, Kaushik Mishra, R. N. Singh, and Ramakant Bhardwaj. "Software Defined Networking Based Detection of DDoS Attacks." International Journal of Emerging Technology and Advanced Engineering 13, no. 4 (2023): 96–104. http://dx.doi.org/10.46338/ijetae0423_11.

Full text
Abstract:
Software-defined networking (SDN) separates network management from data-traffic routes. More businesses are adopting it because of its flexibility, adaptability, and ability to improve traffic movement. SDN, or security-by-design, might be a desirable alternative for securing networks. While there have been many advancements in SDN technology, it is still susceptible to DDoS assaults. The growing frequency and scope of DDoS attacks pose a threat to network security, despite the availability of various methods for detecting and countering such attacks. There are two main methods to spot a dist
APA, Harvard, Vancouver, ISO, and other styles
16

Vijila, J., and A. Albert Raj. "Ameliorate Security by Introducing Security Server in Software Defined Network." Computers, Materials & Continua 62, no. 3 (2020): 1077–96. http://dx.doi.org/10.32604/cmc.2020.08534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Al-Mashadani, Abdulrahman Khalid Abdullah, and Muhammad Ilyas. "Distributed Denial of Service Attack Alleviated and Detected by Using Mininet and Software Defined Network." Webology 19, no. 1 (2022): 4129–44. http://dx.doi.org/10.14704/web/v19i1/web19272.

Full text
Abstract:
The network security and how to keep it safe from malicious attacks now days is attract huge interest of the developers and cyber security experts (SDN) Software- Defined Network is simple framework for network that allow programmability and monitoring that enable the operators to manage the entire network in a consistent and comprehensive manner also used to detect and alleviate the DDoS attacks the SDN now is the trending of network security evolution there many threats that faces the networks one of them is the distributed Denial of Service (DDoS) because of the architecture weakness in tra
APA, Harvard, Vancouver, ISO, and other styles
18

Jude K. Agujiobi. "Software Defined Netconomics." International Journal of Science and Research Archive 11, no. 1 (2024): 2399–407. http://dx.doi.org/10.30574/ijsra.2024.11.1.0203.

Full text
Abstract:
This paper is based on the fair analysis on the economic benefits of software defined networking. The paper will explain vividly the concept of software defined networking and its applications together with the economic advantage(s) with respect to both the client perspective and server perspective. In general, SDN provides lower hardware and operational cost in an excessive traffic load of nowadays users. It has tighter security and faster response time with improved management and planning of server controller. SDN when deployed provides better service(s) with respect to lowering cost and of
APA, Harvard, Vancouver, ISO, and other styles
19

Su, Shang-Chiuan, Yi-Ren Chen, Shi-Chun Tsai, and Yi-Bing Lin. "Detecting P2P Botnet in Software Defined Networks." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/4723862.

Full text
Abstract:
Software Defined Network separates the control plane from network equipment and has great advantage in network management as compared with traditional approaches. With this paradigm, the security issues persist to exist and could become even worse because of the flexibility on handling the packets. In this paper we propose an effective framework by integrating SDN and machine learning to detect and categorize P2P network traffics. This work provides experimental evidence showing that our approach can automatically analyze network traffic and flexibly change flow entries in OpenFlow switches th
APA, Harvard, Vancouver, ISO, and other styles
20

Changqing Zhao, Changqing Zhao, Ling Xia Liao Changqing Zhao, Han-Chieh Chao Ling Xia Liao, Roy Xiaorong Lai Han-Chieh Chao, and Miao Zhang Roy Xiaorong Lai. "Flow Table Overflow Attacks in Software Defined Networks: A Survey." 網際網路技術學刊 24, no. 7 (2023): 1391–401. http://dx.doi.org/10.53106/160792642023122407001.

Full text
Abstract:
<p>While Software-Defined Networks (SDNs) have separated control and data planes and completely decouple the flow control from the data forwarding to enable network flexibility, programmability, and innovation, they also raise serious security concerns in each plane and the interfaces between the two planes. This paper, instead of studying the security issues in the SDN control plane as many literatures have done in current research, focuses on the security issues in the SDN data plane, aiming at the state of the art mechanims to identify, detect, and mitigate them. Specifically, this pa
APA, Harvard, Vancouver, ISO, and other styles
21

Tripathy, Bata Krishna, Debi Prasad Das, Swagat Kumar Jena, and Padmalochan Bera. "Risk based Security Enforcement in Software Defined Network." Computers & Security 78 (September 2018): 321–35. http://dx.doi.org/10.1016/j.cose.2018.07.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Jeyakumar, V. "Future Internet of Things with Software Defined Networking." International Journal of Advance Research and Innovative Ideas in Education 7, no. 2 (2021): 562–71. https://doi.org/10.5281/zenodo.4738436.

Full text
Abstract:
Future Internet of Things (IoT) will hook up with the web billions of heterogeneous smart devices with the capacity of interacting with the environment. Therefore, the proposed solutions from an IoT networking perspective must take under consideration the scalability of IoT nodes also because the operational cost of deploying the networking infrastructure. This will generate an enormous volume of knowledge, which poses an incredible challenge both from the transport, and processing of data point of view. Moreover, security issues appear, thanks to the very fact that untrusted IoT devices are i
APA, Harvard, Vancouver, ISO, and other styles
23

McCoy, James, and Danda B. Rawat. "Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey." Electronics 8, no. 12 (2019): 1468. http://dx.doi.org/10.3390/electronics8121468.

Full text
Abstract:
Despite the immense benefits offered by the utilization of unmanned aerial vehicles (UAVs) in civilian and military applications, significant work needs to be done to ensure that these systems are able to securely communicate and resiliently operate to accomplish the mission. As the UAVs grow with their popularity and usability for different applications, there is a dire need to ensure that UAVs and their networks are capable of mitigating cyber-attacks on the fly. One approach that has gained considerable popularity is Software-Defined Networking (SDN) based solutions. SDN is a networking par
APA, Harvard, Vancouver, ISO, and other styles
24

Deenadhayalan, Pratiba, Ramakanth Kumar Pattar, and Vijay Chiranjith Reddy. "Functional segments and software defined trends in enterprise networks." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 2 (2023): 957. http://dx.doi.org/10.11591/ijeecs.v31.i2.pp957-967.

Full text
Abstract:
In the current scenarios most of the business growth comes from the user experience, while using the business applications. Any enterprise network performance depends on the fundamental process of securely serving the user with applications. The network usage patterns have completely changed from just data transfer, voice, and video transmissions to serving entire applications over the networks. With all the modern applications served over the private and public clouds the network resources utilization must be optimized and take full advantage of them which is not possible with current network
APA, Harvard, Vancouver, ISO, and other styles
25

Pratiba, Deenadhayalan, Kumar Pattar Ramakanth, and Chiranjith Reddy Vijay. "Functional segments and software defined trends in enterprise networks." Functional segments and software defined trends in enterprise networks 31, no. 2 (2023): 957–67. https://doi.org/10.11591/ijeecs.v31.i2.pp957-967.

Full text
Abstract:
In the current scenarios most of the business growth comes from the user experience, while using the business applications. Any enterprise network performance depends on the fundamental process of securely serving the user with applications. The network usage patterns have completely changed from just data transfer, voice, and video transmissions to serving entire applications over the networks. With all the modern applications served over the private and public clouds the network resources utilization must be optimized and take full advantage of them which is not possible with current network
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Min, Yongfeng Qian, Shiwen Mao, Wan Tang, and Ximin Yang. "Software-Defined Mobile Networks Security." Mobile Networks and Applications 21, no. 5 (2016): 729–43. http://dx.doi.org/10.1007/s11036-015-0665-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Saqib, Muhammad, Farrukh Zeeshan Khan, Muneer Ahmed, and Raja Majid Mehmood. "A critical review on security approaches to software-defined wireless sensor networking." International Journal of Distributed Sensor Networks 15, no. 12 (2019): 155014771988990. http://dx.doi.org/10.1177/1550147719889906.

Full text
Abstract:
Wireless sensor networks (WSNs) are very prone to ongoing security threats due to its resource constraints and unprotected transmission medium. WSN contains hundreds and thousands of resource-constrained and self-organized sensor nodes. These sensor nodes are usually organized in a distributed manner; thus, it permits the creation of an ad hoc network without predefined infrastructure or centralized management. As WSNs are going to get control of real-time applications, where a malicious activity can cause serious damage, the inherent challenge is to fortify the security enforcement in these n
APA, Harvard, Vancouver, ISO, and other styles
28

Neeraj Singla. "Configuration of Complex Networking Using Secure Software Defined Network System." Communications on Applied Nonlinear Analysis 32, no. 2s (2024): 339–49. https://doi.org/10.52783/cana.v32.2409.

Full text
Abstract:
Software-defined networking (SDN) presents a promising solution for simplifying the management and configuration of complex campus networks this research paper focuses on the application of SDN in the context of campus networks and its impact on network management by centralizing control and policy enforcement SDN enables network administrators to effectively manage network access prioritize traffic and implement security measures additionally SDN facilitates quick adaptation to changing network requirements in campus environments this paper examines the benefits and challenges of deploying SD
APA, Harvard, Vancouver, ISO, and other styles
29

Allouzi, Maha Ali, and Javed I. Khan. "Advanced Authentication Protocol for Software-Defined Networks." International Journal of Semantic Computing 12, no. 03 (2018): 361–71. http://dx.doi.org/10.1142/s1793351x18400160.

Full text
Abstract:
Software-Defined Networking (SDN) is being widely implemented by critical infrastructure networks, however providing security features still a challenge. In this work, we present SafeFlow an Automatic Trust Negotiation Protocol for SDN, a first line of defense and fine-grained authentication protocol, in order to deny the access of OpenFlow switches without valid digital credentials. Traditional security approaches based on identity or capabilities do not solve the problem of establishing trust between strangers. One alternative approach to mutual trust establishment is Trust Negotiation, the
APA, Harvard, Vancouver, ISO, and other styles
30

Karunakaran, Vasantharaj, and Angelina Geetha. "A Secured Software Defined Network Architecture for Mini Net using POX Controller." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 226–31. http://dx.doi.org/10.17762/ijritcc.v11i4.6443.

Full text
Abstract:
SDN (software-defined networks) is a new technology that stems from numerous network security enhancements. It handles network data in a flexible manner using highly secure frameworks. The secure SDN model's purpose is to ensure data security. The proposed idea to be executed is a robust firewall protection in a mini net employing a POX controller. In order to deal with network-induced dangers, the huge network connectivity influenced environment requires additional protection. The proposed effort focuses on creating a secure SDN simulation architecture that is managed by Open Source POX Contr
APA, Harvard, Vancouver, ISO, and other styles
31

Samta, Rajni, and Pooja Rani. "Survey on Software Defined Network based Botnet Attacks." Volume 5 - 2020, Issue 8 - August 5, no. 8 (2020): 1117–19. http://dx.doi.org/10.38124/ijisrt20aug647.

Full text
Abstract:
Software Defined Network has been a solution to those problems which have emerged with the advancement of social interconnection through internet, cloud computing and internet of things. Along with the speed and efficiency of any network, there are certain other parameters which are of great importance for an organization. These organizations are demanding more flexible networks which are dynamic enough to change or mould the network according to their needs. Software Defined Network breaks the barriers of traditional way of networking, where as it is cost efficient as it simplifies hardware a
APA, Harvard, Vancouver, ISO, and other styles
32

Cunha, José, Pedro Ferreira, Eva M. Castro, et al. "Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies." Future Internet 16, no. 7 (2024): 226. http://dx.doi.org/10.3390/fi16070226.

Full text
Abstract:
The rapid development of 5G networks and the anticipation of 6G technologies have ushered in an era of highly customizable network environments facilitated by the innovative concept of network slicing. This technology allows the creation of multiple virtual networks on the same physical infrastructure, each optimized for specific service requirements. Despite its numerous benefits, network slicing introduces significant security vulnerabilities that must be addressed to prevent exploitation by increasingly sophisticated cyber threats. This review explores the application of cutting-edge techno
APA, Harvard, Vancouver, ISO, and other styles
33

Mahdi, Suadad S., and Alharith A. Abdullah. "Enhanced Security of Software-defined Network and Network Slice Through Hybrid Quantum Key Distribution Protocol." Infocommunications journal 14, no. 3 (2022): 9–15. http://dx.doi.org/10.36244/icj.2022.3.2.

Full text
Abstract:
Software-defined networking (SDN) has revolutionized the world of technology as networks have become more flexible, dynamic and programmable. The ability to conduct network slicing in 5G networks is one of the most crucial features of SDN implementation. Although network programming provides new security solutions of traditional networks, SDN and network slicing also have security issues, an important one being the weaknesses related to openflow channel between the data plane and controller as the network can be attacked via the openflow channel and exploit communications with the control plan
APA, Harvard, Vancouver, ISO, and other styles
34

Alkhamisi, Abrar, Iyad Katib, and Seyed M. Buhari. "Blockchain-Based Control Plane Attack Detection Mechanisms for Multi-Controller Software-Defined Networks." Electronics 13, no. 12 (2024): 2279. http://dx.doi.org/10.3390/electronics13122279.

Full text
Abstract:
A Multi-Controller Software-Defined Network (MC-SDN) is a revolutionary concept comprising multiple controllers and switches separated using programmable features, enhancing network availability, management, scalability, and performance. The MC-SDN is a potential choice for managing large, heterogeneous, complex industrial networks. Despite the rich operational flexibility of MC-SDN, it is imperative to protect the network deployment with proper protection against potential vulnerabilities that lead to misuse and malicious activities on the MC-SDN structure. The security holes in the MC-SDN st
APA, Harvard, Vancouver, ISO, and other styles
35

Raj, Prem, Prince Kumar, and Rajan S. "Software-Defined Networking Controller with Enhanced Traffic Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40499.

Full text
Abstract:
SDNs decouple control from data layers enabling simplified management and innovation in networking. These project describe the Network Management System(NMS) which can be implemented by the SDN concept, and in this we use Ryu controller as brain of our NMS. The Ryu controller decouples the control plane (decision-making) from the data plane (data forwarding), which allows for better traffic management capabilities. This approach provides performance and scalability due to the way SDN works, because in large networks we run into challenges such as flexibility, reliability, availability as well
APA, Harvard, Vancouver, ISO, and other styles
36

Liyanage, Madhusanka, Ahmed Bux Abro, Mika Ylianttila, and Andrei Gurtov. "Opportunities and Challenges of Software-Defined Mobile Networks in Network Security." IEEE Security & Privacy 14, no. 4 (2016): 34–44. http://dx.doi.org/10.1109/msp.2016.82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Fan, Zhijie, Ya Xiao, Amiya Nayak, and Chengxiang Tan. "An improved network security situation assessment approach in software defined networks." Peer-to-Peer Networking and Applications 12, no. 2 (2017): 295–309. http://dx.doi.org/10.1007/s12083-017-0604-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hussain, Mudassar, Nadir Shah, Rashid Amin, Sultan S. Alshamrani, Aziz Alotaibi, and Syed Mohsan Raza. "Software-Defined Networking: Categories, Analysis, and Future Directions." Sensors 22, no. 15 (2022): 5551. http://dx.doi.org/10.3390/s22155551.

Full text
Abstract:
Software-defined networking (SDN) is an innovative network architecture that splits the control and management planes from the data plane. It helps in simplifying network manageability and programmability, along with several other benefits. Due to the programmability features, SDN is gaining popularity in both academia and industry. However, this emerging paradigm has been facing diverse kinds of challenges during the SDN implementation process and with respect to adoption of existing technologies. This paper evaluates several existing approaches in SDN and compares and analyzes the findings.
APA, Harvard, Vancouver, ISO, and other styles
39

Tanweer, Alam, and Aljohani Mohammed. "Software Defined Networks: Review and Architecture." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (2020): 132–51. https://doi.org/10.34306/itsdi.v1i2%20April.114.

Full text
Abstract:
 In the fifth-generation communication system, secured and reliable data packets will rely on the network with high availability and low latency. The 5G network enables the dynamic control of nodes with low latency. Ultra-reliability is one of the challenging tasks in softwaredefined networks. The ultra-reliability feature is an interface working with high availability and low latency that brings in fifth-generation networks. The Internet of Things will work in the societies so that it required ultra-reliability features to empower the peoples as well as machines for collaborating with th
APA, Harvard, Vancouver, ISO, and other styles
40

J.V., Anand. "DESIGN AND DEVELOPMENT OF SECURE AND SUSTAINABLE SOFTWARE DEFINED NETWORKS." Journal of Ubiquitous Computing and Communication Technologies 2019, no. 02 (2019): 110–20. http://dx.doi.org/10.36548/jucct.2019.2.005.

Full text
Abstract:
Nowadays the technological advancements have made the internet ubiquitous and linked a wide group of people to be through it, paving way for a network transferal, causing the applications to be shifted from its local servers to the cloud ecosystem. The shifting of the computer applications led to entailment of enormous network connectivity that caused difficulties in the operations of the network. The software defined networks emerged as capable solution for the managing the difficulties arising due to the paradigm shift, and enriched the network operators with high flexibility programming in
APA, Harvard, Vancouver, ISO, and other styles
41

Mardaus, Aleksandra, Edyta Biernacka, Robert Wójcik, and Jerzy Domżał. "Open Source Software-Defined Networking Controllers—Operational and Security Issues." Electronics 13, no. 12 (2024): 2329. http://dx.doi.org/10.3390/electronics13122329.

Full text
Abstract:
The Software-Defined Networking concept plays an important role in network management. The central controller, which is the main element of SDN, allows the provision of traffic engineering and security solutions in single- and multiple-layer networks based on optical transmission. In this work, we compare selected open-source implementations of SDN controllers. Throughput and latency measurements were analyzed using the CBench program. The simulation of a link failure and a controller failure were conducted using the API provided by the Mininet network simulator. To detect security vulnerabili
APA, Harvard, Vancouver, ISO, and other styles
42

Mane, Sulakshana B., Kiran Shrimant Kakade, Arun H. Ukarande, B. P. Saoji, and Kiran Joshi. "Honeybrid method for network security in a software defined network system." International Journal of Electronic Security and Digital Forensics 16, no. 6 (2024): 690–702. http://dx.doi.org/10.1504/ijesdf.2024.142015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

S, Narayini, Gokulapriya M, Raashmi V, and Senthil Madasamy N. "Opensec: Policy Based Security using Internal Software Defined Network." IJARCCE 6, no. 3 (2017): 385–90. http://dx.doi.org/10.17148/ijarcce.2017.6388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Abazari, Farzaneh, Flavio Esposito, Hassan Takabi, Hamid Hosseinvand, and Tommaso Pecorella. "Teaching software-defined network security through malicious tenant detection." Internet Technology Letters 2, no. 6 (2019): e131. http://dx.doi.org/10.1002/itl2.131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Erxia Li, Erxia Li, Yuling Li Erxia Li, Zilong Han Yuling Li, Chaoqun Kang Zilong Han, and Li Wang Chaoqun Kang. "Research on the Security Protection of Secondary Distribution System Based on Software defined Perimeters." 電腦學刊 34, no. 5 (2023): 045–57. http://dx.doi.org/10.53106/199115992023103405004.

Full text
Abstract:
<p>With the new technologies including big data, cloud computing, the Internet of Things (IoT), mobile Internet, and Artificial Intelligence (AI) coming into widespread in the secondary distribution system, it makes the network boundary more fuzzy, and the network security risk points and exposed surfaces significantly increase. Therefore, the traditional boundary-based security protection model has been unable to meet the protection needs. As one of the most popular security concepts at present, the zero trust mechanism can achieve the dynamic protection of information intranets. Based
APA, Harvard, Vancouver, ISO, and other styles
46

Babu, Mr P. Hari. "Digital Twin-based DDoS Attack Detection Using Software Defined Networks." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1249–54. https://doi.org/10.22214/ijraset.2025.67507.

Full text
Abstract:
The concept of Digital Twin (DT) has transformed industries by enabling virtual replicas of physical systems for monitoring and optimization. Integrating DT with Software-Defined Networks (SDN) enhances network flexibility, scalability, and security. This paper presents an SDN-driven digital twin framework for real-time network simulation and cybersecurity enhancement, particularly for Distributed Denial of Service (DDoS) attack mitigation. The system employs Machine Learning (ML) techniques, such as Random Forest, to predict network behavior and dynamically respond to threats. The proposed ap
APA, Harvard, Vancouver, ISO, and other styles
47

Tsehay, Admassu Assegie, and Sekharan Nair Pramod. "A review on software defined network security risks and challenges." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 6 (2019): 3168–74. https://doi.org/10.12928/TELKOMNIKA.v17i6.13119.

Full text
Abstract:
Software defined network is an emerging network architecture that separates the traditional integrated control logic and data forwarding functionality into different planes, namely the control plane and data forwarding plane. The data plane does an end-to-end data delivery. And the control plane does the actual network traffic forwarding and routing between different network segments. In software defined network the networking infrastructure layer is where the entire networking device, such as switches and routers are connected with the separate controller layer with the help of standard calle
APA, Harvard, Vancouver, ISO, and other styles
48

Farooq, Muhammad Shoaib, Shamyla Riaz, and Atif Alvi. "Security and Privacy Issues in Software-Defined Networking (SDN): A Systematic Literature Review." Electronics 12, no. 14 (2023): 3077. http://dx.doi.org/10.3390/electronics12143077.

Full text
Abstract:
Software-defined network (SDNs) have fundamentally changed network infrastructure by decoupling the data plane and the control plane. This architectural shift rejuvenates the network layer by granting the re-programmability and centralized management of networks which brings about exciting challenges. Although an SDN seems to be a secured network when compared to conventional networks, it is still vulnerable and faces rigorous deployment challenges. Moreover, the bifurcation of data and control planes also opens up new security problems. This systematic literature review (SLR) has formalized t
APA, Harvard, Vancouver, ISO, and other styles
49

Shalom, Binti. "Software-Defined Networking (SDN) for Efficient Network Management." International Journal of Computing and Engineering 6, no. 1 (2024): 1–13. http://dx.doi.org/10.47941/ijce.2056.

Full text
Abstract:
Purpose: The general objective of this study was to examine Software-Defined Networking (SDN) for efficient network management. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics
APA, Harvard, Vancouver, ISO, and other styles
50

Fartitchou, Mohamed, Ismail Lamaakal, Yassine Maleh, et al. "IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem." Sensors 24, no. 17 (2024): 5716. http://dx.doi.org/10.3390/s24175716.

Full text
Abstract:
Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper introduces a novel approach to securing SDN environments using IOTA 2.0 smart contracts. The proposed system utilizes the IOTA Tangle, a directed acyclic graph (DAG) structure, to improve scalability and efficiency while eliminating transaction fees and reducing energy consumption. We introduce three smart contracts: Authority, Access Control, and DoS Detector, to e
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!