Academic literature on the topic 'Software Defined Networking Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software Defined Networking Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software Defined Networking Security"

1

Dabbagh, Mehiar, Bechir Hamdaoui, Mohsen Guizani, and Ammar Rayes. "Software-defined networking security: pros and cons." IEEE Communications Magazine 53, no. 6 (June 2015): 73–79. http://dx.doi.org/10.1109/mcom.2015.7120048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hussein, A., Louma Chadad, Nareg Adalian, Ali Chehab, Imad H. Elhajj, and Ayman Kayssi. "Software-Defined Networking (SDN): the security review." Journal of Cyber Security Technology 4, no. 1 (August 8, 2019): 1–66. http://dx.doi.org/10.1080/23742917.2019.1629529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nagarjuna Reddy, Tella, and K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.

Full text
Abstract:
Software Defined Networking and programmability on network have established themselves as current trends in IT by bringing autonomous operation with dynamic flow to network. Networks must be programmable, and it must be aware of the application in order to operate autonomously. Networks need to evolve to catch up with the current trends without losing their current status and operation, reliability, robustness, or security, and without distorting current investments. SDN is a transpiring network architecture where network control plane is distinguished from data plane and by that the network is directly programmable. This control, was initially bound in every network devices, enabled in the network to be abstracted for applications and services. Security is a major challenge for organizational and campus networks. The future of Internet depends on virtualization which is to provide numerous networks hosted the same physical hardware. This proposal takes a great advantage of the programmability provided by SDN to utilize Intrusion Detection System.
APA, Harvard, Vancouver, ISO, and other styles
4

McCoy, James, and Danda B. Rawat. "Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey." Electronics 8, no. 12 (December 3, 2019): 1468. http://dx.doi.org/10.3390/electronics8121468.

Full text
Abstract:
Despite the immense benefits offered by the utilization of unmanned aerial vehicles (UAVs) in civilian and military applications, significant work needs to be done to ensure that these systems are able to securely communicate and resiliently operate to accomplish the mission. As the UAVs grow with their popularity and usability for different applications, there is a dire need to ensure that UAVs and their networks are capable of mitigating cyber-attacks on the fly. One approach that has gained considerable popularity is Software-Defined Networking (SDN) based solutions. SDN is a networking paradigm that has gained attention due to its dynamic flexibility to program networks and increase network visibility, and its potential to assist in the mitigating security vulnerabilities in the network including the network of UAVs. This article provides an overview of recent advances, and current state of art related to security vulnerabilities and SDN enabled countermeasures. This paper also presents a comparison of different approaches in a tabular form and a discussion of challenges and future research directions with respect to UAV security.
APA, Harvard, Vancouver, ISO, and other styles
5

Lara, Adrian, and Byrav Ramamurthy. "OpenSec: Policy-Based Security Using Software-Defined Networking." IEEE Transactions on Network and Service Management 13, no. 1 (March 2016): 30–42. http://dx.doi.org/10.1109/tnsm.2016.2517407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dacier, Marc C., Hartmut Konig, Radoslaw Cwalinski, Frank Kargl, and Sven Dietrich. "Security Challenges and Opportunities of Software-Defined Networking." IEEE Security & Privacy 15, no. 2 (March 2017): 96–100. http://dx.doi.org/10.1109/msp.2017.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Jiaqiang, Yong Li, Huandong Wang, Depeng Jin, Li Su, Lieguang Zeng, and Thanos Vasilakos. "Leveraging software-defined networking for security policy enforcement." Information Sciences 327 (January 2016): 288–99. http://dx.doi.org/10.1016/j.ins.2015.08.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shu, Zhaogang, Jiafu Wan, Di Li, Jiaxiang Lin, Athanasios V. Vasilakos, and Muhammad Imran. "Security in Software-Defined Networking: Threats and Countermeasures." Mobile Networks and Applications 21, no. 5 (January 12, 2016): 764–76. http://dx.doi.org/10.1007/s11036-016-0676-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Full text
Abstract:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.
APA, Harvard, Vancouver, ISO, and other styles
10

Savaliya, Abhishek, Rutvij H. Jhaveri, Qin Xin, Saad Alqithami, Sagar Ramani, and Tariq Ahamed Ahanger. "Securing industrial communication with software-defined networking." Mathematical Biosciences and Engineering 18, no. 6 (2021): 8298–313. http://dx.doi.org/10.3934/mbe.2021411.

Full text
Abstract:
<abstract> <p>Industrial Cyber-Physical Systems (CPSs) require flexible and tolerant communication networks to overcome commonly occurring security problems and denial-of-service such as links failure and networks congestion that might be due to direct or indirect network attacks. In this work, we take advantage of Software-defined networking (SDN) as an important networking paradigm that provide real-time fault resilience since it is capable of global network visibility and programmability. We consider OpenFlow as an SDN protocol that enables interaction between the SDN controller and forwarding plane of network devices. We employ multiple machine learning algorithms to enhance the decision making in the SDN controller. Integrating machine learning with network resilience solutions can effectively address the challenge of predicting and classifying network traffic and thus, providing real-time network resilience and higher security level. The aim is to address network resilience by proposing an intelligent recommender system that recommends paths in real-time based on predicting link failures and network congestions. We use statistical data of the network such as link propagation delay, the number of packets/bytes received and transmitted by each OpenFlow switch on a specific port. Different state-of-art machine learning models has been implemented such as logistic regression, K-nearest neighbors, support vector machine, and decision tree to train these models in normal state, links failure and congestion conditions. The models are evaluated on the Mininet emulation testbed and provide accuracies ranging from around 91–99% on the test data. The machine learning model with the highest accuracy is utilized in the intelligent recommender system of the SDN controller which helps in selecting resilient paths to achieve a better security and quality-of-service in the network. This real-time recommender system helps the controller to take reactive measures to improve network resilience and security by avoiding faulty paths during path discovery and establishment.</p> </abstract>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Software Defined Networking Security"

1

Taylor, Curtis Robin. "Software-defined Networking: Improving Security for Enterprise and Home Networks." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-dissertations/161.

Full text
Abstract:
In enterprise networks, all aspects of the network, such as placement of security devices and performance, must be carefully considered. Even with forethought, networks operators are ultimately unaware of intra-subnet traffic. The inability to monitor intra-subnet traffic leads to blind spots in the network where compromised hosts have unfettered access to the network for spreading and reconnaissance. While network security middleboxes help to address compromises, they are limited in only seeing a subset of all network traffic that traverses routed infrastructure, which is where middleboxes are frequently deployed. Furthermore, traditional middleboxes are inherently limited to network-level information when making security decisions. Software-defined networking (SDN) is a networking paradigm that allows logically centralized control of network switches and routers. SDN can help address visibility concerns while providing the benefits of a centralized network control platform, but traditional switch-based SDN leads to concerns of scalability and is ultimately limited in that only network-level information is available to the controller. This dissertation addresses these SDN limitations in the enterprise by pushing the SDN functionality to the end-hosts. In doing so, we address scalability concerns and provide network operators with better situational awareness by incorporating system-level and graphical user interface (GUI) context into network information handled by the controller. By incorporating host-context, our approach shows a modest 16% reduction in flows that can be processed each second compared to switch-based SDN. In comparison to enterprise networks, residential networks are much more constrained. Residential networks are limited in that the operators typically lack the experience necessary to properly secure the network. As a result, devices on home networks are sometimes compromised and, unbeknownst to the home user, perform nefarious acts such as distributed denial of services (DDoS) attacks on the Internet. Even with operator expertise in residential networks, the network infrastructure is limited to a resource-constrained router that is not extensible. Fortunately, SDN has the potential to increase security and network control in residential networks by outsourcing functionality to the cloud where third-party experts can provide proper support. In residential networks, this dissertation uses SDN along with cloud-based resources to introduce enterprise-grade network security solutions where previously infeasible. As part of our residential efforts, we build and evaluate device-agnostic security solutions that are able to better protect the increasing number of Internet of Things (IoT) devices. Our work also shows that the performance of outsourcing residential network control to the cloud is feasible for up to 90% of home networks in the United States.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Xin. "Enhancing network robustness using software-defined networking." Diss., Kansas State University, 2017. http://hdl.handle.net/2097/38236.

Full text
Abstract:
Doctor of Philosophy
Department of Electrical and Computer Engineering
Don M. Gruenbacher
Caterina M. Scoglio
As today's networks are no longer individual networks, networks are less robust towards failures and attacks. For example, computer networks and power networks are interdependent. Computer networks provide smart control for power networks, while power networks provide power supply. Localized network failures and attacks are amplified and exacerbated back and forth between two networks due to their interdependencies. This dissertation focuses on finding solutions to enhance network robustness. Software-defined networking provides a programmable architecture, which can dynamically adapt to any changes and can reduce the complexities of network traffic management. This architecture brings opportunities to enhance network robustness, for example, adapting to network changes, routing traffic bypassing malfunction devices, dropping malicious flows, etc. However, as SDN is rapidly proceeding from vision to reality, the SDN architecture itself might be exposed to some robustness threats. Especially, the SDN control plane is tremendously attractive to attackers, since it is the "brain" of entire networks. Thus, researching on network robustness helps protect network from a destructive disaster. In this dissertation, we first build a novel, realistic interdependent network framework to model cyber-physical networks. We allocate dependency links under a limited budget and evaluate network robustness. We further revise a network flow algorithm and find solutions to obtain a basic robust network structure. Extensive simulations on random networks and real networks show that our deployment method produces topologies that are more robust than the ones obtained by other deployment techniques. Second, we tackle middlebox chain problems using SDN. In computer networks, applications require traffic to sequence through multiple types of middleboxes to accomplish network functionality. Middlebox policies, numerous applications' requirements, and resource allocations complicate network management. Furthermore, middlebox failures can affect network robustness. We formulate a mixed-integer linear programming problem to achieve a network load-balancing objective in the context of middlebox policy chain routing. Our global routing approach manages network resources efficiently by simplifying candidate-path selections, balancing the entire network and using the simulated annealing algorithm. Moreover, in case of middlebox failures, we design a fast rerouting mechanism by exploiting the remaining link and middlebox resources locally. We implement proposed routing approaches on a Mininet testbed and evaluate experiments' scalability, assessing the effectiveness of the approaches. Third, we build an adversary model to describe in detail how to launch distributed denial of service (DDoS) attacks to overwhelm the SDN controller. Then we discuss possible defense mechanisms to protect the controller from DDoS attacks. We implement a successful DDoS attack and our defense mechanism on the Mininet testbed to demonstrate its feasibility in the real world. In summary, we vertically dive into enhancing network robustness by constructing a topological framework, making routing decisions, and protecting the SDN controller.
APA, Harvard, Vancouver, ISO, and other styles
3

Tseng, Yuchia. "Securing network applications in software defined networking." Electronic Thesis or Diss., Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCB036.

Full text
Abstract:
Suite à l'introduction de divers services Internet, les réseaux informatiques ont été reconnus ‏comme ayant joué un rôle essentiel dans la vie moderne au cours du dernier demi-siècle. Le ‏développement rapide et la convergence des technologies informatiques et de communication ‏créent le besoin de connecter divers périphériques avec différents systèmes d'exploitation ‏et protocoles. Il en résulte de nombreux défis pour fournir une intégration transparente ‏d'une grande quantité de dispositifs physiques ou d'entités hétérogènes. Ainsi, les réseaux ‏définis par logiciel (Software Defined Networks, SDN) en tant que paradigme émergent ont ‏le potentiel de révolutionner la gestion des réseaux en centralisant le contrôle et la visibilité ‏globale sur l'ensemble du réseau. Cependant, les problèmes de sécurité demeurent une préoccupation ‏importante et empêchent l'adoption généralisée du SDN.‏‏ Pour identifier les menaces, nous avons effectué une analyse en 3 dimensions pour évaluer ‏la sécurité de SDN. Dans cette analyse, nous avons repris 9 principes de sécurité pour ‏le contrôleur SDN et vérifié la sécurité des contrôleurs SDN actuels avec ces principes. ‏Nous avons constaté que les contrôleurs SDN, ONOS et OpenContrail sont relativement plus ‏sécurisés que les autres selon notre méthodologie d'analyse. Nous avons également trouvé ‏le besoin urgent d'atténuer le problème d'injection d'applications malveillantes. Par conséquent, ‏nous avons proposé une couche d'amélioration de la sécurité (Security-enhancing layer, couche SE) ‏pour protéger l'interaction entre le plan de contrôle et le plan d’application. ‏‏Cette couche SE est indépendante du contrôleur et peut fonctionner avec OpenDaylight, ONOS, ‏Floodlight, Ryu et POX, avec une faible complexité de déploiement. Aucune modification de ‏leurs codes sources n'est requise dans leur mise en œuvre alors que la sécurité globale du ‏contrôleur SDN est améliorée. Le prototype I, Controller SEPA, protège le contrôleur ‏SDN avec l'authentification de l'application réseau, l'autorisation, l'isolation des ‏applications et le blindage de l'information avec un coût additionnel négligeable de moins ‏de 0,1% à 0,3%. Nous avons développé le prototype II de la couche SE, appelé Controller DAC, ‏qui rend dynamique le contrôle d'accès. Le controller DAC peut détecter l'utilisation ‏abusive de l'API en comptabilisant les opérations de l'application réseau avec un coût ‏additionnel inférieure à 0,5%.‏‏ Grâce à cette couche SE, la sécurité globale du contrôleur SDN est améliorée mais avec un ‏coût additionnel inférieure à 0,5%. De plus, nous avons tenté de fournir un framework de ‏déploiement d'application réseau sécurisé pour le contrôleur SDN avec un orchestrateur. ‏Tout d'abord, nous avons sécurisé le contrôleur SDN en utilisant la file d'attente de ‏messages pour remplacer les interfaces populaires actuelles, y compris les RESTful APIs ‏et les APIs internes, à l'aide d'une interface orientée événement décomposable. Avec cette ‏nouvelle interface northbound, l'orchestrateur peut déployer les applications réseau dans ‏le bac à sable(sanbox) avec contrôle des ressources et contrôle d'accès. Cette approche ‏peut efficacement protéger contre les menaces, qui incluent les attaques d'épuisement des ‏ressources (Resource exhaustion attacks) et le traitement des données sur le contrôleur SDN ‏actuel. Nous avons également implémenté une application réseau déployée par l'orchestrateur ‏pour détecter une attaque spécifique à OpenFlow, appelée attaque par contournement de priorité, ‏pour évaluer l'utilité de l'interface norttbound. À long terme, le temps de traitement d'un ‏message packet_in dans cette interface est inférieur à cinq millisecondes mais l'application ‏réseau peut être complètement découplée et isolée du contrôleur SDN.‏‏
The rapid development and convergence of computing technologies and communications ‏create the need to connect diverse devices with different operating systems and protocols.‏ This resulted in numerous challenges to provide seamless integration of a large amount of ‏heterogeneous physical devices or entities. Hence, Software-defined Networks (SDN), as an ‏emerging paradigm, has the potential to revolutionize the legacy network management and‏ accelerate the network innovation by centralizing the control and visibility over the network. ‏However, security issues remain a significant concern and impede SDN from being widely‏ adopted.‏‏To identity the threats that inherent to SDN, we conducted a deep analysis in 3 dimensions‏ to evaluate the security of the proposed architecture. In this analysis, we summarized 9‏security principles for the SDN controller and checked the security of the current well-known‏ SDN controllers with those principles. We found that the SDN controllers, namely ONOS ‏and OpenContrail, are relatively two more secure controllers according to our conducted ‏methodology. We also found the urgent need to integrate the mechanisms such as connection ‏verification, application-based access control, and data-to-control traffic control for securely ‏implementing a SDN controller. In this thesis, we focus on the app-to-control threats, which ‏could be partially mitigated by the application-based access control. As the malicious network ‏application can be injected to the SDN controller through external APIs, i.e., RESTful APIs, or ‏internal APIs, including OSGi bundles, Java APIs, Python APIs etc. In this thesis, we discuss ‏how to protect the SDN controller against the malicious operations caused by the network‏ application injection both through the external APIs and the internal APIs. ‏We proposed a security-enhancing layer (SE-layer) to protect the interaction between the‏ control plane and the application plane in an efficient way with the fine-grained access control, ‏especially hardening the SDN controller against the attacks from the external APIs. This‏ SE-layer is implemented in the RESTful-based northbound interfaces in the SDN controller‏ and hence it is controller-independent for working with most popular controllers, such as‏ OpenDaylight, ONOS, Floodlight, Ryu and POX, with low deployment complexity. No‏ modifications of the source codes are required in their implementations while the overall security ‏of the SDN controller is enhanced. Our developed prototype I, Controller SEPA, protects well‏ the SDN controller with network application authentication, authorization, application isolation,‏ and information shielding with negligible latency from less than 0.1% to 0.3% for protecting‏ SDN controller against the attacks via external APIs, i.e, RESTful APIs. We developed also‏ the SE-layer prototype II, called Controller DAC, which makes dynamic the access control.‏ Controller DAC can detect the API abuse from the external APIs by accounting the network‏ application operation with latency less than 0.5%. Thanks to this SE-layer, the overall security of the SDN controller is improved but with a latency of less than 0.5%. However, the SE-layer can isolate the network application to communicate the controller only through the RESTful APIs. However, the RESTful APIs is ‏insufficient in the use cases which needs the real-time service to deliver the OpenFlow messages. ‏Therefore, we proposed a security-enhancing architecture for securing the network application‏ deployment through the internal APIs in SDN, with a new SDN architecture dubbed SENAD. In‏ SENAD, we split the SDN controller in: (1) a data plane controller (DPC), and (2) an application ‏plane controller (APC) and adopt the message bus system as the northbound interface instead ‏of the RESTful APIs for providing the service to deliver the OpenFlow messages in real-time.‏ (...)
APA, Harvard, Vancouver, ISO, and other styles
4

Aydeger, Abdullah. "Software Defined Networking for Smart Grid Communications." FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/2580.

Full text
Abstract:
Emerging Software Defined Networking (SDN) technology has provided excellent flexibility to large-scale networks in terms of control, management, security, and maintenance. On the other hand, recent years witnessed a tremendous growth of the critical infrastructure networks, namely the Smart-Grid, in terms of its underlying communication infrastructure. Such large local networks requires significant effort in terms of network management and security. We explore the potential utilization of the SDN technology over the Smart Grid communication architecture. Specifically, we introduce three novel SDN deployment scenarios in local networks of Smart Grid. Moreover, we also investigate the pertinent security aspects with each deployment scenario along with possible solutions. On the other hand, we conducted experiments by using actual Smart Grid communication data to assess the recovery performance of the proposed SDN-based system. The results show that SDN is a viable technology for the Smart Grid communications with almost negligible delays in switching to backup wireless links.
APA, Harvard, Vancouver, ISO, and other styles
5

Ahmad, I. (Ijaz). "Improving software defined cognitive and secure networking." Doctoral thesis, Oulun yliopisto, 2018. http://urn.fi/urn:isbn:9789526219516.

Full text
Abstract:
Abstract Traditional communication networks consist of large sets of vendor-specific manually configurable devices. These devices are hardwired with specific control logic or algorithms used for different network functions. The resulting networks comprise distributed control plane architectures that are complex in nature, difficult to integrate and operate, and are least efficient in terms of resource usage. However, the rapid increase in data traffic requires the integrated use of diverse access technologies and autonomic network operations with increased resource efficiency. Therefore, the concepts of Software Defined Networking (SDN) are proposed that decouple the network control plane from the data-forwarding plane and logically centralize the control plane. The SDN control plane can integrate a diverse set of devices, and tune them at run-time through vendor-agnostic programmable Application Programming Interfaces (APIs). This thesis proposes software defined cognitive networking to enable intelligent use of network resources. Different radio access technologies, including cognitive radios, are integrated through a common control platform to increase the overall network performance. The architectural framework of software defined cognitive networking is presented alongside the experimental performance evaluation. Since SDN enables applications to change the network behavior and centralizes the network control plane to oversee the whole network, it is highly important to investigate SDN in terms of security. Therefore, this thesis finds the potential security vulnerabilities in SDN, studies the proposed security platforms and architectures for those vulnerabilities, and presents future directions for unresolved security vulnerabilities. Furthermore, this thesis also investigates the potential security challenges and their solutions for the enabling technologies of 5G, such as SDN, cloud technologies, and virtual network functions, and provides key insights into increasing the security of 5G networks
Tiivistelmä Perinteiset tietoliikenneverkot pohjautuvat usein laajoille manuaalisesti konfiguroitaville valmistajakohtaisille ratkaisuille. Niissä käytetään laitekohtaista kontrollilogiikkaa tai verkon eri toiminnallisuuksien algoritmeja. Tämän johdosta verkon hajautettu kontrollitaso muodostuu monimutkaiseksi, jota on vaikea integroida ja operoida, eikä se ole kovin joustava resurssien käytön suhteen. Tietoliikenteen määrän kasvaessa tulee entistä tärkeämmäksi integroida useita verkkoteknologioita ja autonomisia verkon toiminnallisuuksia tehokkaan resurssinhallinnan saavuttamiseksi. Ohjelmisto-ohjatut verkkoratkaisut (SDN, Software Defined Networking) tarjoavat keinon hallita erikseen verkon kontrolliliikennettä eroteltuna dataliikenteestä keskitetysti. Tämä kontrollitaso voi integroida erilaisia verkkolaitteita ja ohjata niitä ajonaikaisesti valmistajariippumattoman sovellusohjelmointirajapinnan kautta. Tässä työssä on tutkittu älykästä ohjelmisto-ohjattavaa verkkoratkaisua, jonka avulla eri radioverkkoteknologiat (mukaan lukien konginitiiviradio) voidaan integroida yhteisen kontrollialustan kautta lisäämään verkon kokonaissuorituskykyä. Työssä esitetään kognitiivinen ohjelmisto-ohjattu verkon arkkitehtuuriratkaisu sekä sen suorituskyvyn arviointi mittauksiin pohjautuen. Koska ohjelmisto-ohjattu verkko pohjautuu koko verkon keskitettyyn kontrollilogiikkaan, on tietoturvan merkitys korostunut entisestään. Tässä työssä on sen vuoksi tutkittu juuri tällaisen verkkoratkaisun mahdollisia tietoturvauhkia sekä niiden torjumiseen soveltuvia ratkaisuvaihtoehtoja sekä esitetään tulevaisuuden kehityssuuntia vielä ratkaisemattomille uhkille. Lisäksi työssä on tutkittu laajemmin tulevien 5G verkkojen tietoturvauhkia ja niiden ratkaisuja, liittyen ohjelmisto-ohjattuihin verkkoratkaisuin, pilviteknologioihin ja virtualisoiduille verkkotoiminnallisuuksille. Työ tarjoaa myös näkemyksen siitä, miten verkon tietoturvaa voidaan kokonaisuudessaan lisätä 5G verkoissa
APA, Harvard, Vancouver, ISO, and other styles
6

Lei, Yunsen. "Towards Better Kernel and Network Monitoring of Software Actions." Digital WPI, 2020. https://digitalcommons.wpi.edu/etd-theses/1367.

Full text
Abstract:
Monitoring software actions is one of the most studied approaches to help security researchers understand how software interacts with the system or network. In many cases, monitoring is an important component to help detect attacks that use software vulnerabilities as a vector to compromise endpoints. Attacks are becoming more sophisticated and network use is growing dramatically. Both host-based and network-based monitoring are facing different challenges. A host-based approach has more insight into software's actions but puts itself at the risk of compromise. When deployed on the server endpoint, the lack of separation between different clients only further complicates the monitoring scope. Compared to network-based approaches, host-based monitoring usually loses control of a software's network trace once the network packet leaves the endpoint. On the other hand, network-based monitoring usually has full control of a software's network packets but confronts scalability problems as the network grows. This thesis focuses on the limitations of the current monitoring approaches and technologies and proposes different solutions to mitigate the current problem. For software-defined networking, we design and implement a host-based SDN system that achieves the same forwarding path control and packet rewriting functionality as a switch-based SDN. Our implementation empower the host-based SDN with more control in the network even without using any SDN-enabled middleboxes, allowing SDN adoption in large-scale deployments. We further corroborate flow reports from different host SDN agents to address the endpoint compromise problem. On the server endpoint, we leverage containers as a light-weight environment to separate different clients and build monitoring infrastructures to narrow down the monitoring scope that have the potential to facilitate further forensic analysis.
APA, Harvard, Vancouver, ISO, and other styles
7

Sriskandarajah, Shriparen. "Detection and mitigation of denial-of-service attacks against software-defined networking." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/226951/1/Shriparen_Sriskandarajah_Thesis.pdf.

Full text
Abstract:
Software-defined networking (SDN) is an emerging architecture in computer networking that was introduced to fulfill the demand of current Internet-based services and applications. New features introduced in the SDN architecture open the space for attackers to disrupt the SDN-based networks using new types of Denial-of-Service (DoS) attacks. In this study, first, we present a new DoS attack, namely the control channel DoS attack. Second, we present another new DoS attack to overwhelm the flow table of the SDN switches, namely the flow rule overwhelming attack. Finally, we propose novel strategies to detect and mitigate DoS attacks against the SDN architecture.
APA, Harvard, Vancouver, ISO, and other styles
8

Abou, El Houda Zakaria. "Security Enforcement through Software Defined Networks (SDN)." Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.

Full text
Abstract:
La conception originale d'Internet n'a pas pris en compte les aspects de sécurité du réseau, l’objectif prioritaire était de faciliter le processus de communication. Par conséquent, de nombreux protocoles de l'infrastructure Internet exposent un ensemble de vulnérabilités. Ces dernières peuvent être exploitées par les attaquants afin de mener un ensemble d’attaques. Les attaques par déni de service distribué (DDoS) représentent une grande menace; DDoS est l'une des attaques les plus dévastatrices causant des dommages collatéraux aux opérateurs de réseau ainsi qu'aux fournisseurs de services Internet. Les réseaux programmables (SDN) ont émergé comme un nouveau paradigme promettant de résoudre les limitations de l’architecture réseau actuelle en découplant le plan de contrôle du plan de données. D'une part, cette séparation permet un meilleur contrôle du réseau et apporte de nouvelles capacités pour mitiger les attaques par DDoS. D'autre part, cette séparation introduit de nouveaux défis en matière de sécurité du plan de contrôle. L’enjeu de cette thèse est double. D'une part, étudier et explorer l’apport du SDN à la sécurité afin de concevoir des solutions efficaces qui vont mitiger plusieurs vecteurs d’attaques. D'autre part, protéger le SDN contre ces attaques. À travers ce travail de recherche, nous contribuons à la mitigation des attaques par déni de service distribué sur deux niveaux (intra et inter-domaine), et nous contribuons au renforcement de la sécurité dans le SDN
The original design of Internet did not take into consideration security aspects of the network; the priority was to facilitate the process of communication. Therefore, many of the protocols that are part of the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers to carry out a set of attacks. Distributed Denial-of-Service (DDoS) represents a big threat and one of the most devastating and destructive attacks plaguing network operators and Internet service providers (ISPs) in stealthy way. Software defined networks (SDN) is an emerging technology that promises to solve the limitations of the conventional network architecture by decoupling the control plane from the data plane. On one hand, the separation of the control plane from the data plane allows for more control over the network and brings new capabilities to deal with DDoS attacks. On the other hand, this separation introduces new challenges regarding the security of the control plane. This thesis aims to deal with DDoS attacks while protecting the resources of the control plane. In this thesis, we contribute to the mitigation of both intra-domain and inter-domain DDoS attacks, and we contribute to the reinforcement of security aspects in SDN
APA, Harvard, Vancouver, ISO, and other styles
9

Taylor, Curtis R. "Leveraging Software-Defined Networking and Virtualization for a One-to-One Client-Server Model." Digital WPI, 2014. https://digitalcommons.wpi.edu/etd-theses/577.

Full text
Abstract:
Modern computer networks allow server resources to be shared. While this multiplexing is the unsung hero of scalability and performance, the fact that clients are sharing resources and each client’s network traffic is transmitted in a larger pool of the total network traffic, poses distinct challenges for security. By adopting multiplexing so broadly, the networking and systems communities have implicitly favored performance over security. When servers multiplexing clients are compromised, the attack is able to spread by exploiting unsuspecting clients sharing the resource. Drive-by-downloads are an example of an attack where a Web server is compromised and begins distributing malware to connecting clients. As a result of using today’s many-to-one client-server network model, current approaches are inadequate at protecting the network and its resources. We propose a redesign of the modern network infrastructure. Our approach involves moving from the current many-to-one client-server model to a one-to-one client-server model. In redesigning the network, we provide a means of better accountability for traffic between clients and servers. With accountability, we enable the ability to quickly determine which client is responsible for an attack. This allows us to quickly repair the affected entities. To accomplish this accountability, we separate each client’s communication into separate flows. A flow is identified by various network features, such as IP addresses and ports. Further, instead of allowing multiple clients to be multiplexed at the same server, we use a technique that allows each client to communicate with a server that is logically separate from all other clients. Accordingly, a server compromise only effects a single client. We create a one-to-one client-server model using virtualization techniques and OpenFlow, a software-defined network (SDN) protocol. We complete our model in three phases. In the first, we deploy a physical SDN using physical machines and a commodity network switch that supports OpenFlow to gain an initial understanding of SDNs. The next phase involves implementation of Choreographer, a DNS access control mechanism, in a virtualized SDN environment for better scalability over our physical configuration. Finally, we leverage Choreographer to dynamically instantiate a server for each client and create network flows that allow a client to reach the requested server.
APA, Harvard, Vancouver, ISO, and other styles
10

Rivera, Polanco Sergio A. "AUTOMATED NETWORK SECURITY WITH EXCEPTIONS USING SDN." UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/87.

Full text
Abstract:
Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network interactions must abide by. While users are the audience for AUP documents produced by an organization's PWC, network administrators are the responsible party enforcing the contents of such policies using low-level CLI instructions and configuration files that are typically difficult to understand and are almost impossible to show that they do, in fact, enforce the AUPs. In other words, mapping the contents of imprecise unstructured sentences into technical configurations is a challenging task that relies on the interpretation and expertise of the network operator carrying out the policy enforcement. Moreover, there are multiple places where policy enforcement can take place. For example, policies governing servers (e.g., web, mail, and file servers) are often encoded into the server's configuration files. However, from a security perspective, conflating policy enforcement with server configuration is a dangerous practice because minor server misconfigurations could open up avenues for security exploits. On the other hand, policies that are enforced in the network tend to rarely change over time and are often based on one-size-fits-all policies that can severely limit the fast-paced dynamics of emerging research workflows found in campus networks. This dissertation addresses the above problems by leveraging recent advances in Software-Defined Networking (SDN) to support systems that enable novel in-network approaches developed to support an organization's network security policies. Namely, we introduce PoLanCO, a human-readable yet technically-precise policy language that serves as a middle-ground between the imprecise statements found in AUPs and the technical low-level mechanisms used to implement them. Real-world examples show that PoLanCO is capable of implementing a wide range of policies found in campus networks. In addition, we also present the concept of Network Security Caps, an enforcement layer that separates server/device functionality from policy enforcement. A Network Security Cap intercepts packets coming from, and going to, servers and ensures policy compliance before allowing network devices to process packets using the traditional forwarding mechanisms. Lastly, we propose the on-demand security exceptions model to cope with the dynamics of emerging research workflows that are not suited for a one-size-fits-all security approach. In the proposed model, network users and providers establish trust relationships that can be used to temporarily bypass the policy compliance checks applied to general-purpose traffic -- typically by network appliances that perform Deep Packet Inspection, thereby creating network bottlenecks. We describe the components of a prototype exception system as well as experiments showing that through short-lived exceptions researchers can realize significant improvements for their special-purpose traffic.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Software Defined Networking Security"

1

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. Software-Defined Networking and Security. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sahoo, Kshira Sagar, Bibhudatta Sahoo, and Brojo Kishore Mishra. Software-Defined Networking for Future Internet Technology. New York: Apple Academic Press, 2021. http://dx.doi.org/10.1201/9781003145721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ghonge, Mangesh M., Sabyasachi Pramanik, and Amol D. Potgantwar, eds. Software Defined Networking for Ad Hoc Networks. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91149-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qi, Heng, and Keqiu Li. Software Defined Networking Applications in Distributed Datacenters. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33135-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Italy) IEEE SDN for Future Networks and Services (2013 Trento. 2013 IEEE SDN for Future Networks and Services (SDN4FNS 2013): Trento, Italy, 11-13 November 2013. Piscataway, NJ: IEEE, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

L, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Boston, MA: Course Technology, Cengage Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Inc, Cisco Systems, and Cisco Networking Academy Program, eds. Cisco Networking Academy Program: Fundamentals of network security companion guide / Cisco Systems, Inc., Cisco Networking Academy Program. Indianapolis, Ind: Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Parker, Philip M. Information technology (IT) security software in Hong Kong: A strategic reference, 2006. [San Diego, Calif]: Icon Group International, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Seagren, Eric. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRTG. Edited by Noonan Wesley J. Rockland, Mass: Syngress, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brian, Baskin, and Piltzecker Tony 1975-, eds. Combating spyware in the enterprise. Rockland, MA: Syngress, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Software Defined Networking Security"

1

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Virtual Networking." In Software-Defined Networking and Security, 39–79. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Intelligent Software-Defined Security." In Software-Defined Networking and Security, 281–301. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Network Security Preliminaries." In Software-Defined Networking and Security, 109–26. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "SDN and NFV Security." In Software-Defined Networking and Security, 127–49. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nazar, Muhammad Junaid, Saleem Iqbal, Saud Altaf, Kashif Naseer Qureshi, Khalid Hussain Usmani, and Sobia Wassan. "Software-Defined Networking (SDN) Security Concerns." In Information Security Handbook, 19–38. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9780367808228-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Security Policy Management in Distributed SDN Environments." In Software-Defined Networking and Security, 247–80. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Attack Representation." In Software-Defined Networking and Security, 205–24. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Service Function Chaining." In Software-Defined Networking and Security, 225–46. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Introduction of Computer Networks." In Software-Defined Networking and Security, 7–38. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "SDN and NFV." In Software-Defined Networking and Security, 81–108. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, 2018. | Series: Data-enabled engineering: CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software Defined Networking Security"

1

François, Jérôme, Lautaro Dolberg, Olivier Festor, and Thomas Engel. "Network security through software defined networking." In the Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2670386.2670390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmad, Ijaz, Suneth Namal, Mika Ylianttila, and Andrei Gurtov. "Towards software defined cognitive networking." In 2015 7th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2015. http://dx.doi.org/10.1109/ntms.2015.7266528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Klingel, David, Rahamatullah Khondoker, Ronald Marx, and Kpatcha Bayarou. "Security Analysis of Software Defined Networking Architectures." In the AINTEC 2014. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2684793.2684796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shang, Fengjun, and Qiang Fu. "A Software-Defined Networking Security Controller Architecture." In 2016 4th International Conference on Machinery, Materials and Computing Technology. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/icmmct-16.2016.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bian, Shanshan, Peng Zhang, and Zheng Yan. "A Survey on Software-Defined Networking Security." In 9th EAI International Conference on Mobile Multimedia Communications. ACM, 2016. http://dx.doi.org/10.4108/eai.18-6-2016.2264176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smyth, Dylan, Victor Cionca, Sean McSweeney, and Donna O'Shea. "Exploiting pitfalls in software-defined networking implementation." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 2016. http://dx.doi.org/10.1109/cybersecpods.2016.7502354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Melki, Reem, Ali Hussein, and Ali Chehab. "Enhancing Multipath TCP Security Through Software Defined Networking." In 2019 Sixth International Conference on Software Defined Systems (SDS). IEEE, 2019. http://dx.doi.org/10.1109/sds.2019.8768608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Francois, Jerome, and Olivier Festor. "Anomaly traceback using software defined networking." In 2014 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2014. http://dx.doi.org/10.1109/wifs.2014.7084328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aziz, Normaziah A., Teddy Mantoro, M. Aiman Khairudin, and A. Faiz b. A. Murshid. "Software Defined Networking (SDN) and its Security Issues." In 2018 International Conference on Computing, Engineering, and Design (ICCED). IEEE, 2018. http://dx.doi.org/10.1109/icced.2018.00018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Melkov, Dmitrij, and Sarunas Paulikas. "Security Benefits and Drawbacks of Software-Defined Networking." In 2021 IEEE Open Conference of Electrical, Electronic and Information Sciences (eStream). IEEE, 2021. http://dx.doi.org/10.1109/estream53087.2021.9431466.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Software Defined Networking Security"

1

Torres, Dustin, Jonathan Friedman, Thomas Schmid, and Mani B. Srivastave. Software-Defined Underwater Acoustic Networking Platform. Fort Belvoir, VA: Defense Technical Information Center, November 2009. http://dx.doi.org/10.21236/ada510286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Denazis, S., J. Hadi Salim, D. Meyer, and O. Koufopavlou. Software-Defined Networking (SDN): Layers and Architecture Terminology. Edited by E. Haleplidis and K. Pentikousis. RFC Editor, January 2015. http://dx.doi.org/10.17487/rfc7426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lopez, D., M. Boucadair, and P. Iovanna. Cooperating Layered Architecture for Software-Defined Networking (CLAS). RFC Editor, May 2019. http://dx.doi.org/10.17487/rfc8597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhuvaneswaran, V., A. Basil, M. Tassinari, V. Manral, and S. Banks. Terminology for Benchmarking Software-Defined Networking (SDN) Controller Performance. RFC Editor, October 2018. http://dx.doi.org/10.17487/rfc8455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bhuvaneswaran, V., A. Basil, M. Tassinari, V. Manral, and S. Banks. Benchmarking Methodology for Software-Defined Networking (SDN) Controller Performance. RFC Editor, October 2018. http://dx.doi.org/10.17487/rfc8456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boucadair, M., and C. Jacquenet. Software-Defined Networking: A Perspective from within a Service Provider Environment. RFC Editor, March 2014. http://dx.doi.org/10.17487/rfc7149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mix, Scott, Mark Hadley, Surya Singh, Clifton Eyre, Laurence Chang, S. Cullen Tollbom, Christopher Bonebrake, et al. Software-defined Networking for Energy Delivery Systems (SDN4EDS): An Architectural Blueprint – Final Report. Office of Scientific and Technical Information (OSTI), December 2021. http://dx.doi.org/10.2172/1840650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Marin-Lopez, R., G. Lopez-Millan, and F. Pereniguez-Garcia. A YANG Data Model for IPsec Flow Protection Based on Software-Defined Networking (SDN). RFC Editor, July 2021. http://dx.doi.org/10.17487/rfc9061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mix, Scott, Mark Hadley, Surya Singh, Clifton Eyre, Laurence Chang, S. Cullen Tollbom, Christopher Bonebrake, et al. Software-defined Networking for Energy Delivery Systems (SDN4EDS): An Architectural Blueprint – Final Summary Report. Office of Scientific and Technical Information (OSTI), December 2021. http://dx.doi.org/10.2172/1840651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yuan, Xin. Software Defined Networking for HPC Interconnects and its Extension across Domains. Final Technical Report for DE-SC0016039. Office of Scientific and Technical Information (OSTI), May 2019. http://dx.doi.org/10.2172/1512493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography