To see the other types of publications on this topic, follow the link: Software Defined Networking Security.

Journal articles on the topic 'Software Defined Networking Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software Defined Networking Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dabbagh, Mehiar, Bechir Hamdaoui, Mohsen Guizani, and Ammar Rayes. "Software-defined networking security: pros and cons." IEEE Communications Magazine 53, no. 6 (June 2015): 73–79. http://dx.doi.org/10.1109/mcom.2015.7120048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hussein, A., Louma Chadad, Nareg Adalian, Ali Chehab, Imad H. Elhajj, and Ayman Kayssi. "Software-Defined Networking (SDN): the security review." Journal of Cyber Security Technology 4, no. 1 (August 8, 2019): 1–66. http://dx.doi.org/10.1080/23742917.2019.1629529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nagarjuna Reddy, Tella, and K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.

Full text
Abstract:
Software Defined Networking and programmability on network have established themselves as current trends in IT by bringing autonomous operation with dynamic flow to network. Networks must be programmable, and it must be aware of the application in order to operate autonomously. Networks need to evolve to catch up with the current trends without losing their current status and operation, reliability, robustness, or security, and without distorting current investments. SDN is a transpiring network architecture where network control plane is distinguished from data plane and by that the network is directly programmable. This control, was initially bound in every network devices, enabled in the network to be abstracted for applications and services. Security is a major challenge for organizational and campus networks. The future of Internet depends on virtualization which is to provide numerous networks hosted the same physical hardware. This proposal takes a great advantage of the programmability provided by SDN to utilize Intrusion Detection System.
APA, Harvard, Vancouver, ISO, and other styles
4

McCoy, James, and Danda B. Rawat. "Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey." Electronics 8, no. 12 (December 3, 2019): 1468. http://dx.doi.org/10.3390/electronics8121468.

Full text
Abstract:
Despite the immense benefits offered by the utilization of unmanned aerial vehicles (UAVs) in civilian and military applications, significant work needs to be done to ensure that these systems are able to securely communicate and resiliently operate to accomplish the mission. As the UAVs grow with their popularity and usability for different applications, there is a dire need to ensure that UAVs and their networks are capable of mitigating cyber-attacks on the fly. One approach that has gained considerable popularity is Software-Defined Networking (SDN) based solutions. SDN is a networking paradigm that has gained attention due to its dynamic flexibility to program networks and increase network visibility, and its potential to assist in the mitigating security vulnerabilities in the network including the network of UAVs. This article provides an overview of recent advances, and current state of art related to security vulnerabilities and SDN enabled countermeasures. This paper also presents a comparison of different approaches in a tabular form and a discussion of challenges and future research directions with respect to UAV security.
APA, Harvard, Vancouver, ISO, and other styles
5

Lara, Adrian, and Byrav Ramamurthy. "OpenSec: Policy-Based Security Using Software-Defined Networking." IEEE Transactions on Network and Service Management 13, no. 1 (March 2016): 30–42. http://dx.doi.org/10.1109/tnsm.2016.2517407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dacier, Marc C., Hartmut Konig, Radoslaw Cwalinski, Frank Kargl, and Sven Dietrich. "Security Challenges and Opportunities of Software-Defined Networking." IEEE Security & Privacy 15, no. 2 (March 2017): 96–100. http://dx.doi.org/10.1109/msp.2017.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Jiaqiang, Yong Li, Huandong Wang, Depeng Jin, Li Su, Lieguang Zeng, and Thanos Vasilakos. "Leveraging software-defined networking for security policy enforcement." Information Sciences 327 (January 2016): 288–99. http://dx.doi.org/10.1016/j.ins.2015.08.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shu, Zhaogang, Jiafu Wan, Di Li, Jiaxiang Lin, Athanasios V. Vasilakos, and Muhammad Imran. "Security in Software-Defined Networking: Threats and Countermeasures." Mobile Networks and Applications 21, no. 5 (January 12, 2016): 764–76. http://dx.doi.org/10.1007/s11036-016-0676-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Full text
Abstract:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.
APA, Harvard, Vancouver, ISO, and other styles
10

Savaliya, Abhishek, Rutvij H. Jhaveri, Qin Xin, Saad Alqithami, Sagar Ramani, and Tariq Ahamed Ahanger. "Securing industrial communication with software-defined networking." Mathematical Biosciences and Engineering 18, no. 6 (2021): 8298–313. http://dx.doi.org/10.3934/mbe.2021411.

Full text
Abstract:
<abstract> <p>Industrial Cyber-Physical Systems (CPSs) require flexible and tolerant communication networks to overcome commonly occurring security problems and denial-of-service such as links failure and networks congestion that might be due to direct or indirect network attacks. In this work, we take advantage of Software-defined networking (SDN) as an important networking paradigm that provide real-time fault resilience since it is capable of global network visibility and programmability. We consider OpenFlow as an SDN protocol that enables interaction between the SDN controller and forwarding plane of network devices. We employ multiple machine learning algorithms to enhance the decision making in the SDN controller. Integrating machine learning with network resilience solutions can effectively address the challenge of predicting and classifying network traffic and thus, providing real-time network resilience and higher security level. The aim is to address network resilience by proposing an intelligent recommender system that recommends paths in real-time based on predicting link failures and network congestions. We use statistical data of the network such as link propagation delay, the number of packets/bytes received and transmitted by each OpenFlow switch on a specific port. Different state-of-art machine learning models has been implemented such as logistic regression, K-nearest neighbors, support vector machine, and decision tree to train these models in normal state, links failure and congestion conditions. The models are evaluated on the Mininet emulation testbed and provide accuracies ranging from around 91–99% on the test data. The machine learning model with the highest accuracy is utilized in the intelligent recommender system of the SDN controller which helps in selecting resilient paths to achieve a better security and quality-of-service in the network. This real-time recommender system helps the controller to take reactive measures to improve network resilience and security by avoiding faulty paths during path discovery and establishment.</p> </abstract>
APA, Harvard, Vancouver, ISO, and other styles
11

Xu, Rui Yang, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu, and Zheng Yan. "Software Defined Intelligent Building." International Journal of Information Security and Privacy 9, no. 3 (July 2015): 84–99. http://dx.doi.org/10.4018/ijisp.2015070105.

Full text
Abstract:
The networks of intelligent building are usually consist of a great number of smart devices. Since many smart devices only support on-site configuration and upgrade, and communication between devices could be observed and even altered by attackers, efficiency and security are two key concerns in maintaining and managing the devices used in intelligent building networks. In this paper, the authors apply the technology of software defined networking to satisfy the requirement for efficiency in intelligent building networks. More specific, a protocol stack in smart devices that support OpenFlow is designed. In addition, the authors designed the lightweight security mechanism with two foundation protocols and a full protocol that uses the foundation protocols as example. Performance and session key establishment for the security mechanism are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
12

Tsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.

Full text
Abstract:
Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN) Firewall that automatically applies this standard architecture without compromising network flexibility. Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal.Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines.Research limitations/implications: The prototype implementation still needs to implement several features to exploit the full potential of the proposal. Next steps for development are discussed in a separate section.Practical implications: The proposed SDN Firewall has similar security features to commercially available application Firewalls, but SDN Firewalls offer additional security features. First, SDN technology provides improved performance, since SDN low-level processing functions are much more efficient. Second, with SDN, security functions are rooted in the network instead of being centralized in particular network elements. Finally, SDN provides a more flexible and dynamic, zero configuration framework for secure manufacturing systems by automating the rollout of security standard-based network architectures. Social implications: SDN Firewalls can facilitate the deployment of secure Industry 4.0 manufacturing systems, since they provide ICS networks with many of the needed security capabilities without compromising flexibility. Originality/value: The paper proposes a novel SDN Firewall specifically designed to secure ICS networks. A prototype implementation of the proposed SDN Firewall has been tested in laboratory conditions. The prototype implementation complements the security features of the OPC UA communication standard to provide a holistic security framework for ICS networks.
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Yifan, Bo Zhao, Pengyuan Zhao, Peiru Fan, and Hui Liu. "A survey: Typical security issues of software-defined networking." China Communications 16, no. 7 (July 2019): 13–31. http://dx.doi.org/10.23919/jcc.2019.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Alzahrani, Bander, and Nikos Fotiou. "Enhancing Internet of Things Security using Software-Defined Networking." Journal of Systems Architecture 110 (November 2020): 101779. http://dx.doi.org/10.1016/j.sysarc.2020.101779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Waseem, Quadri, Sultan S. Alshamrani, Kashif Nisar, Wan Isni Sofiah Wan Din, and Ahmed Saeed Alghamdi. "Future Technology: Software-Defined Network (SDN) Forensic." Symmetry 13, no. 5 (April 28, 2021): 767. http://dx.doi.org/10.3390/sym13050767.

Full text
Abstract:
The software-defined networking (SDN) paradigm has recently emerged as a trend to build various protocols, develop more reliable networks, enhance the data flow controlling, and provide security in a much simpler and flexible way. SDN helps to ease management and handle asymmetric connectivity across various nodes. It solves the problems of network and cloud security and hence provides the best solution for the safety of data on the network. Therefore, we feel the urge to research more and provide the basics of SDN forensics, mention its advantages in network especially in the cloud, and present its elaborate prospects in context with Network Forensic (NF) and Cloud Forensic (CF). In this research article, we explained in detail the NF and CF with emphasis on Network security (NS) and Cloud Security (CS). The paper also provided the various security approaches and categories. Then, an overview of the software-defined networking (SDN) is mentioned. We also discussed the use of SDN in Network Forensic and Cloud Forensic. Furthermore, to aid the SDN forensic, we presented the advantages, challenges, and issues along with future research directions of SDN in network forensic and cloud forensic, and at last, we thus express and explore the need for security in forensic based on the SDN paradigm in the form of a set of suggested recommendations.
APA, Harvard, Vancouver, ISO, and other styles
16

Farhady, Hamid, and Akihiro Nakao. "Tag-Based Classification for Software-Defined Networking." International Journal of Grid and High Performance Computing 7, no. 1 (January 2015): 1–14. http://dx.doi.org/10.4018/ijghpc.2015010101.

Full text
Abstract:
Software-Defined Networking (SDN) increasingly attracts more researchers as well as industry attentions. Most of current SDN packet processing approaches classify packets based on matching a set of fields on the packet against a flow table and then applying an action on the packet. The authors argue that it is possible to simplify this mechanism using single-field classification and reduce the overhead. They propose a tag-based packet classification architecture to reduce filtering and flow management overhead. Then, they show how to use this extra capacity to perform application layer classification for different purposes. The authors demonstrated their evaluation results to indicate the effectiveness of the proposal. Furthermore, they implemented a customized user-defined SDN action that addresses some security challenges of one of their previous works and showed performance evaluation results.
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, Woosik, and Namgi Kim. "Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking." Information 8, no. 2 (June 13, 2017): 65. http://dx.doi.org/10.3390/info8020065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Abed, Abdullah Suhail, Brwa Khalil Abdullah Ahmed, Sura Khalil Ibrahim, Musaddak Maher Abdul Zahra, Mohanad Ahmed Salih, and Refed Adnan Jaleel. "Development of an Integrate E-Medical System Using Software Defined Networking and Machine Learning." Webology 19, no. 1 (January 20, 2022): 3410–18. http://dx.doi.org/10.14704/web/v19i1/web19224.

Full text
Abstract:
Scholars and medical professionals have recognizes the importance of electronic medical monitoring services for tracking elderly people's health. These platforms generate a large amount of data, requiring privacy and data security. on the contrary, Using Software Defined Networking (SDN) to maintain network efficiency and flexibility, which is especially important in the case of healthcare observation, could be a viable solution. Moreover, machine learning can additionally utilized as a game changing tool which incorporated with SDN for optimal level of privacy and security. Even so, integrating SDN into machine learning, which heavily relies on health sensors of patients, is incredibly difficult. In this paper, an Integrate Medical Platform (IMP) with a focus on SDN and Machine learning integration is proposed. We produce a platform that reduces complexity by identifying high level SDN regulations based on the extracted flow classes and utilizing machine learning traffic flow classification techniques. F or various types of traffic, We employ supervised learning approaches based on models that have already been trained. We use four algorithms for supervised learning: Random forest, Logistic Regression classifiers, K-NN, and SVM, with different characteristics. Finally, we evaluated IMP by using accuracy, precision, TPR, TNR, FPR, MAE, and energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
19

Hussain, Mudassar, Nadir Shah, Rashid Amin, Sultan S. Alshamrani, Aziz Alotaibi, and Syed Mohsan Raza. "Software-Defined Networking: Categories, Analysis, and Future Directions." Sensors 22, no. 15 (July 25, 2022): 5551. http://dx.doi.org/10.3390/s22155551.

Full text
Abstract:
Software-defined networking (SDN) is an innovative network architecture that splits the control and management planes from the data plane. It helps in simplifying network manageability and programmability, along with several other benefits. Due to the programmability features, SDN is gaining popularity in both academia and industry. However, this emerging paradigm has been facing diverse kinds of challenges during the SDN implementation process and with respect to adoption of existing technologies. This paper evaluates several existing approaches in SDN and compares and analyzes the findings. The paper is organized into seven categories, namely network testing and verification, flow rule installation mechanisms, network security and management issues related to SDN implementation, memory management studies, SDN simulators and emulators, SDN programming languages, and SDN controller platforms. Each category has significance in the implementation of SDN networks. During the implementation process, network testing and verification is very important to avoid packet violations and network inefficiencies. Similarly, consistent flow rule installation, especially in the case of policy change at the controller, needs to be carefully implemented. Effective network security and memory management, at both the network control and data planes, play a vital role in SDN. Furthermore, SDN simulation tools, controller platforms, and programming languages help academia and industry to implement and test their developed network applications. We also compare the existing SDN studies in detail in terms of classification and discuss their benefits and limitations. Finally, future research guidelines are provided, and the paper is concluded.
APA, Harvard, Vancouver, ISO, and other styles
20

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, Suresh Shanmugasundaram, Ankit Saxena, Omar Cheikhrouhou, and Hadda Ben Elhadj. "Software-Defined Networking: An Evolving Network Architecture—Programmability and Security Perspective." Security and Communication Networks 2021 (May 12, 2021): 1–7. http://dx.doi.org/10.1155/2021/9971705.

Full text
Abstract:
Software-defined networking is an evolving network architecture beheading the traditional network architecture focusing its disadvantages in a limited perspective. A couple of decades before, programming and networking were viewed as different domains which today with the lights of SDN bridging themselves together. This is to overcome the existing challenges faced by the networking domain and an attempt to propose cost-efficient effective and feasible solutions. Changes to the existing network architecture are inevitable considering the volume of connected devices and the data being held together. SDN introduces a decoupled architecture and brings customization within the network making it easy to configure, manage, and troubleshoot. This paper focuses on the evolving network architecture, the software-defined networking. Unlike a generic view on the evolving network, which makes work as a review, this work addresses various perspectives of the architecture leaving it an intermediate work in between the review of the literature and implementation, contributing towards factors like the design, programmability, security, security behaviors, and security lapses. This paper also analyses various weak points of the architecture and evolves the attack vectors in each plane leaving a conclusion to further progress towards identifying the impacts of the attacks and proposing mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
21

Gaur, Kuntal, Pranjal Choudhary, Priya Yadav, Ayush Jain, and Pradeep Kumar. "Software Defined Networking: A review on Architecture, Security and Applications." IOP Conference Series: Materials Science and Engineering 1099, no. 1 (March 1, 2021): 012073. http://dx.doi.org/10.1088/1757-899x/1099/1/012073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

LI, Wenjuan, Weizhi MENG, Zhiqiang LIU, and Man-Ho AU. "Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions." IEICE Transactions on Information and Systems E103.D, no. 2 (February 1, 2020): 196–203. http://dx.doi.org/10.1587/transinf.2019ini0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Geng, Rong, Xiaojie Wang, and Jun Liu. "A Software Defined Networking-Oriented Security Scheme for Vehicle Networks." IEEE Access 6 (2018): 58195–203. http://dx.doi.org/10.1109/access.2018.2875104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rawat, Danda B., and Swetha R. Reddy. "Software Defined Networking Architecture, Security and Energy Efficiency: A Survey." IEEE Communications Surveys & Tutorials 19, no. 1 (2017): 325–46. http://dx.doi.org/10.1109/comst.2016.2618874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ding, Aaron Yi, Jon Crowcroft, Sasu Tarkoma, and Hannu Flinck. "Software defined networking for security enhancement in wireless mobile networks." Computer Networks 66 (June 2014): 94–101. http://dx.doi.org/10.1016/j.comnet.2014.03.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Allouzi, Maha Ali, and Javed I. Khan. "Advanced Authentication Protocol for Software-Defined Networks." International Journal of Semantic Computing 12, no. 03 (September 2018): 361–71. http://dx.doi.org/10.1142/s1793351x18400160.

Full text
Abstract:
Software-Defined Networking (SDN) is being widely implemented by critical infrastructure networks, however providing security features still a challenge. In this work, we present SafeFlow an Automatic Trust Negotiation Protocol for SDN, a first line of defense and fine-grained authentication protocol, in order to deny the access of OpenFlow switches without valid digital credentials. Traditional security approaches based on identity or capabilities do not solve the problem of establishing trust between strangers. One alternative approach to mutual trust establishment is Trust Negotiation, the bilateral exchange of digital credentials to establish trust gradually. The proposed protocol describes Trust Negotiation in OpenFlow protocol, probable extension to the OpenFlow handshake protocol. In this paper, we describe the implementation of SafeFlow. The proposed protocol ensures the security of the infrastructure itself, as there are also other proposals for developing security application on OpenFlow network infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
27

Algarni, Sultan, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni, and Aiiad Albeshri. "BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking." Electronics 11, no. 7 (March 23, 2022): 996. http://dx.doi.org/10.3390/electronics11070996.

Full text
Abstract:
Software-defined networking (SDN) has emerged as a flexible and programmable network architecture that takes advantage of the benefits of global visibility and centralized control over a network. One of the main properties of the SDN architecture is the ability to offer a northbound interface (NBI), which enables network applications to access the SDN controller resources. However, the NBI can be compromised by a malicious application due to the lack of standardization and security aspects in the most current NBI designs. Therefore, in this paper, we propose a novel comprehensive security solution for securing the application–controller interface, named BCNBI. We propose a controller-independent lightweight blockchain architecture and exploit the security features of blockchain while limiting the blockchain’s computational overhead. BCNBI automatically verifies application and SDN controller credentials through token-based authentication. The proposed solution enforces fine-grained access control for each application’s API request and classifies the permission set into strict and normal policies, in order to add an extra level of security. In addition, the trustworthiness of applications is evaluated in order to prevent malicious activities. We implemented our blockchain-based solution to analyze its security, based on the confidentiality–integrity–availability model criteria, and evaluated the introduced overhead in terms of processing time and packet overhead. The experimental results demonstrate that the BCNBI can effectively secure the NBI, based on the fundamental security goals, while introducing insignificant overhead.
APA, Harvard, Vancouver, ISO, and other styles
28

Rauf, Bilal, Haider Abbas, Muhammad Usman, Tanveer A. Zia, Waseem Iqbal, Yawar Abbas, and Hammad Afzal. "Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3453648.

Full text
Abstract:
Software Defined Networking (SDN) is an evolving technology that decouples the control functionality from the underlying hardware managed by the control plane. The application plane supports programmers to develop numerous applications (such as networking, management, security, etc.) that can even be executed from remote locations. Northbound interface (NBI) bridges the control and application planes to execute the third-party applications business logic. Due to the software bugs in applications and existing vulnerabilities such as illegal function calling, resource exhaustion, lack of trust, and so on, NBIs are susceptible to different attacks. Based on the extensive literature review, we have identified that the researchers and academia have mainly focused on the security of the control plane, data plane, and southbound interface (SBI). NBI, in comparison, has received far less attention. In this article, the security of the least explored, but a critical component of the SDN architecture, i.e., NBI, is analyzed. The article provides a brief overview of SDN, followed by a detailed discussion on the categories of NBI, vulnerabilities of NBI, and threats posed by malicious applications to NBI. Efforts of the researchers to counter malicious applications and NBI issues are then discussed in detail. The standardization efforts for the single acceptable NBI and security requirements of SDN by Open Networking Foundation (ONF) are also presented. The article concludes with the future research directions for the security of a single acceptable NBI.
APA, Harvard, Vancouver, ISO, and other styles
29

Varun Kumar, K. A., and D. Arivudainambi. "Performance analysis of security framework for software defined network architectures." International Journal of Advances in Applied Sciences 8, no. 3 (September 1, 2019): 232. http://dx.doi.org/10.11591/ijaas.v8.i3.pp232-242.

Full text
Abstract:
<p>Software defined data centers (SDDC) and software defined networking (SDN) are two emerging areas in the field of cloud data centers. SDN based centrally controlled services takes a global view of the entire cloud infrastructure between SDDC and SDN, whereas Network Function Virtualization (NFV) is widely used for providing virtual networking between host and Internet Service Providers (ISP’s). Some Application as a Service used in NFV data centers have a wide range in building security services like Virtual firewalls, Intrusion Detection System (IDS), load balancing, bandwidth allocation and management. In this paper, a novel security framework is proposed to combat SDDC and SDN based on NFV security features. The proposed framework consists of a Virtual firewall and an efficient bandwidth manager to handle multiple heterogeneous application requests from different ISPs. Real time data were taken from an experiment for a week and A new simulation based proof of concept is admitted in this paper for validation of the proposed framework which was deployed in real time SDNs using Mininet and POX controller.</p>
APA, Harvard, Vancouver, ISO, and other styles
30

Alshameri, Hamza Mutaher, and Pradeep Kumar. "An Efficient Zero-Knowledge Proof Based Identification Scheme for Securing Software Defined Network." Scalable Computing: Practice and Experience 20, no. 1 (March 9, 2019): 181–89. http://dx.doi.org/10.12694/scpe.v20i1.1473.

Full text
Abstract:
Software Defined Networking (SDN) is being extensively adopted by researchers and enterprise networks due to its feature of decoupling data and control planes from network device which enables them to implement new networking ideas. Communication between data and control planes faces various security issues where many users in data plane approach controller device in control plane to gain networking policies. In this paper, we proposed an efficient Zero-knowledge proof based identification scheme for securing SDN controller during data and control plane communication. This scheme ensures that only users who prove their knowledge about secrecy without revealing actual secret or any other information about it can communicate with controller. The computation cost was calculated to validate efficiency of the proposed work and compared with scheme that works in the basis of Kerberos authentication protocol.
APA, Harvard, Vancouver, ISO, and other styles
31

B, Mr Manikandan, and Mr Murugan K. "A Survey on New Security improvement in Internet of Things utilized by Software Defined Networking (SDN)." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1617–20. http://dx.doi.org/10.22214/ijraset.2022.45417.

Full text
Abstract:
Abstract: IoT Security is that the realm of endeavor concerned with safeguarding connected devices and networks with within the internet of things (IoT). IoT is a forthcoming innovation that produces utilization of web to control/screen electronic, mechanical gadgets, automobiles and other physical gadgets associated by means of networking. Reliability of such intricate diversified networks and their access protocols is additionally a real challenge which leads to security risk. Combination of Software Defined Networking with IoT can lead the way for better security and access control mechanisms. SDN could even be an intelligent networking paradigm which reveals vast opportunities to manage and secure IoT. The SDN approach focuses on the programmability for all network elements. Thus SDN based IoT architecture is often employed to workout security framework.
APA, Harvard, Vancouver, ISO, and other styles
32

Wani, Azka, and S. Revathi. "Ransomware protection in IoT using software defined networking." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 3166. http://dx.doi.org/10.11591/ijece.v10i3.pp3166-3175.

Full text
Abstract:
Internet of things (IoT) is the network of physical objects connected to provide various services. IoT is expanding rapidly, and is positively influencing many areas. The impact of IoT is evident in medical field, manufacturing units and livestock. The IoT is also vulnerable to many cyber threats, owing to its limited resources and battery operation. In contemporary times the security threats like DDoS, botnet malware, man in the middle, flood attacks and ransomware are affecting the smooth functioning of IoT. Ransomware has emerged as one of the biggest threat in cyber world. Ransomware is a type of malware that stops the access to files by encrypting them and decrypts the files only when a ransom is paid. The negligence towards the IoT ransomware can result in disastrous outcomes. In this paper, the growth of ransomware attacks for past few years is shown with special focus on ransomwares threatening IoT. A detection mechanism for IoT ransomware attack is presented that is designed after study of ransomware for IoT. The proposed model monitors the incoming IoT traffic through Software Defined Network (SDN) gateway. It uses policies framed in SDN controller for detection and alleviation of ransomware in IoT.
APA, Harvard, Vancouver, ISO, and other styles
33

Priyadarsini, Madhukrishna, and Padmalochan Bera. "Software defined networking architecture, traffic management, security, and placement: A survey." Computer Networks 192 (June 2021): 108047. http://dx.doi.org/10.1016/j.comnet.2021.108047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Al Hayajneh, Abdullah, Md Zakirul Alam Bhuiyan, and Ian McAndrew. "Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN)." Computers 9, no. 1 (February 7, 2020): 8. http://dx.doi.org/10.3390/computers9010008.

Full text
Abstract:
There has been an increase in the usage of Internet of Things (IoT), which has recently become a rising area of interest as it is being extensively used for numerous applications and devices such as wireless sensors, medical devices, sensitive home sensors, and other related IoT devices. Due to the demand to rapidly release new IoT products in the market, security aspects are often overlooked as it takes time to investigate all the possible vulnerabilities. Since IoT devices are internet-based and include sensitive and confidential information, security concerns have been raised and several researchers are exploring methods to improve the security among these types of devices. Software defined networking (SDN) is a promising computer network technology which introduces a central program named ‘SDN Controller’ that allows overall control of the network. Hence, using SDN is an obvious solution to improve IoT networking performance and overcome shortcomings that currently exist. In this paper, we (i) present a system model to effectively use SDN with IoT networks; (ii) present a solution for mitigating man-in-the-middle attacks against IoT that can only use HTTP, which is a critical attack that is hard to defend; and (iii) implement the proposed system model using Raspberry Pi, Kodi Media Center, and Openflow Protocol. Our system implementation and evaluations show that the proposed technique is more resilient to cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
35

Luo, Shibo, Mianxiong Dong, Kaoru Ota, Jun Wu, and Jianhua Li. "A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks." Sensors 15, no. 12 (December 17, 2015): 31843–58. http://dx.doi.org/10.3390/s151229887.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wrona, Konrad, Sander Oudkerk, Sebastian Szwaczyk, and Marek Amanowicz. "Content-based security and protected core networking with software-defined networks." IEEE Communications Magazine 54, no. 10 (October 2016): 138–44. http://dx.doi.org/10.1109/mcom.2016.7588283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Shang, Fengjun, Yan Li, Qiang Fu, Wenkai Wang, Jiangfan Feng, and Li He. "Distributed controllers multi-granularity security communication mechanism for software-defined networking." Computers & Electrical Engineering 66 (February 2018): 388–406. http://dx.doi.org/10.1016/j.compeleceng.2017.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Aziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (June 20, 2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.

Full text
Abstract:
Cloud networks are being used in most industries and applications in the current era. Software-defined networking has come up as an alternative tool and mechanism to follow and implement in a cloud networking environment in place of the traditional networking approaches. This paper includes the security aspects of computer networking concerning the cloud networking environment and software-defined networks. The security risks and vulnerabilities have been listed and described in this work, and the measures that may be adapted to detect, prevent, and control the same. The use of figures, diagrams, and codes has been done as applicable.
APA, Harvard, Vancouver, ISO, and other styles
39

Mythili, R., and N. Revathi Venkataraman. "Security Threats in Software Defined Mobile Clouds (SDMC)." Journal of Communications Software and Systems 12, no. 2 (June 22, 2016): 105. http://dx.doi.org/10.24138/jcomss.v12i2.81.

Full text
Abstract:
Future Internet comprises of emerging ICT mega-trends (e.g., mobile, social, cloud, and big data) commands new challenges like ubiquitous accessibility, high bandwidth, and dynamic management to meet the data tsunami requirements. In the recent years, the rapid growth of smartphone business is highly evidenced due to its versatile usage irrespective of location, personality or context. Despite of increased smartphone usage, exploiting its full potential becomes very difficult owing to its typical issues such as resource scarcity, mobility and more prominently the security. Software Defined Networking (SDN), an emerging wireless network paradigm can make use of rich mobile cloud functionalities such as traffic management, load balancing, routing, and firewall configuration over physical abstraction of control planes from data planes. Hence SDN leads to a clear roadmap to Software Security control in Mobile Clouds (SDMC). Further it can be extended to a level of Security prevention. To address in this direction, this paper surveys the relevant backgrounds of the existing state-of-art works to come up with all possible SDMC threats and its countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
40

Alghamdi, Mohammed I., Abeer Y. Salawi, and Salwa H. Alghamdi. "Smart Model for Securing Software Defined Networks." Journal of Cybersecurity and Information Management 10, no. 1 (2022): 08–17. http://dx.doi.org/10.54216/jcim.0100101.

Full text
Abstract:
Software defined networks (SDN) remain a hot research field as it provides controllable networking operations. The SDN controller can be treated as the operating system of the SDN model and it holds the responsibility of performing different networking applications. Despite the benefits of SDN, security remains a challenging problem. At the same time, distributed denial of services (DDoS) is a typical attack on SDN owing to centralized architecture, especially at the control layer of the SDN. This article develops a new Cat Swarm Optimization with Fuzzy Rule Base Classification (CSO-FRBCC) model for cybersecurity in SDN. The presented CSO-FRBCC model intends to effectually categorize the occurrence of DDoS attacks in SDN. To achieve this, the CSO-FRBCC model primarily pre-processes the input data to transform it to a uniform format. Besides, the CSO-FRBCC model employs FRBCC classifier for the recognition and classification of intrusions. Moreover, the parameter optimization of the FRBCC classification model is adjusted by the use of cat swarm optimization (CSO) algorithm which results in improved performance. A comprehensive set of simulations were carried out on benchmark dataset and the results highlighted the enhanced outcomes of the CSO-FRBCC model over the other recent approaches.
APA, Harvard, Vancouver, ISO, and other styles
41

Papavassiliou, Symeon. "Software Defined Networking (SDN) and Network Function Virtualization (NFV)." Future Internet 12, no. 1 (January 2, 2020): 7. http://dx.doi.org/10.3390/fi12010007.

Full text
Abstract:
The role of Software Defined Networking (SDN) and Network Function Virtualization (NFV) have been instrumental in realizing the transition and vision “from black boxes to a white box towards facilitating 5G network architectures”. Though significant research results and several deployments have occurred and realized over the last few years focusing on the NFV and SDN technologies, several issues—both of theoretical and practical importance—remain still open. Accordingly, the papers of this special issue are significant contributions samples within the general ecosystem highlighted above, ranging from SDN and NFV architectures and implementations, to SDN-NFV integration and orchestration approaches, while considering issues associated with optimization, network management and security aspects. In particular, a total of nine excellent articles (one review and eight original research articles) have been accepted, following a rigorous review process, and addressing many of the aforementioned challenges and beyond.
APA, Harvard, Vancouver, ISO, and other styles
42

Saqib, Muhammad, Farrukh Zeeshan Khan, Muneer Ahmed, and Raja Majid Mehmood. "A critical review on security approaches to software-defined wireless sensor networking." International Journal of Distributed Sensor Networks 15, no. 12 (December 2019): 155014771988990. http://dx.doi.org/10.1177/1550147719889906.

Full text
Abstract:
Wireless sensor networks (WSNs) are very prone to ongoing security threats due to its resource constraints and unprotected transmission medium. WSN contains hundreds and thousands of resource-constrained and self-organized sensor nodes. These sensor nodes are usually organized in a distributed manner; thus, it permits the creation of an ad hoc network without predefined infrastructure or centralized management. As WSNs are going to get control of real-time applications, where a malicious activity can cause serious damage, the inherent challenge is to fortify the security enforcement in these networks. As a solution, software-defined network (SDN) has come out and has been merged with WSN to form what is known as software-defined wireless sensor network (SDWSN). SDWSN has come into existence, and it legitimizes network operators with more flexibility and control over the network. SDWSN has more tightened the security enforcement based on the global view and centralized control of the network topology. Moreover, machine learning (ML)–based and deep learning (DL)–based network intrusion detection systems (NIDS) have been introduced to the SDN environment to protect the networks against anomaly threats. In this review article, we illustrated the SDN–based security approaches to WSN followed by its architectures, advantages, and possible security threats. Finally, ML/DL–based NIDS integrated with the SDN controller is proposed as a complete solution for the WSN environment to confront the ongoing anomaly threats and to sufficiently protect the network against both known and unknown attacks.
APA, Harvard, Vancouver, ISO, and other styles
43

Hoque, Mohammad Ashraful, MD Shibli Mollah, and MD Razu. "Feasibility Analysis of the Algorithms: Secured and Efficient Routing Path Update in Software Defined Networking (SDN)." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 6 (July 4, 2019): 59–64. http://dx.doi.org/10.17762/ijritcc.v7i6.5325.

Full text
Abstract:
Software-defined networking is the talk of the town in today’s networking industry. Because of the limitations of traditional networking, SDN is getting more popular every year. Lots of researches are taking place to improve the efficiency and overcome the challenges of SDN though it has many advantages. Hence one key problem of SDN is the network update. If the route update does not perform well, it causes congestion and inconsistencies in the network system whereas bandwidth utilization and security is our main concern. We have compared two pre-built algorithms especially for routing path update and proposed a new algorithm with maximum security and loop-free network.
APA, Harvard, Vancouver, ISO, and other styles
44

Eom, Taehoon, Jin B. Hong, SeongMo An, Jong Sou Park, and Dong Seong Kim. "A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models." Security and Communication Networks 2020 (February 18, 2020): 1–15. http://dx.doi.org/10.1155/2020/7235043.

Full text
Abstract:
Software defined networking (SDN) has been adopted in many application domains as it provides functionalities to dynamically control the network flow more robust and more economical compared to the traditional networks. In order to strengthen the security of the SDN against cyber attacks, many security solutions have been proposed. However, those solutions need to be compared in order to optimize the security of the SDN. To assess and evaluate the security of the SDN systematically, one can use graphical security models (e.g., attack graphs and attack trees). However, it is difficult to provide defense against an attack in real time due to their high computational complexity. In this paper, we propose a real-time intrusion response in SDN using precomputation to estimate the likelihood of future attack paths from an ongoing attack. We also take into account various SDN components to conduct a security assessment, which were not available when addressing only the components of an existing network. Our experimental analysis shows that we are able to estimate possible attack paths of an ongoing attack to mitigate it in real time, as well as showing the security metrics that depend on the flow table, including the SDN component. Hence, the proposed approach can be used to provide effective real-time mitigation solutions for securing SDN.
APA, Harvard, Vancouver, ISO, and other styles
45

Meng, Yunfei, Zhiqiu Huang, Guohua Shen, and Changbo Ke. "A security policy model transformation and verification approach for software defined networking." Computers & Security 100 (January 2021): 102089. http://dx.doi.org/10.1016/j.cose.2020.102089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Jafarian, Tohid, Mohammad Masdari, Ali Ghaffari, and Kambiz Majidzadeh. "Security anomaly detection in software-defined networking based on a prediction technique." International Journal of Communication Systems 33, no. 14 (July 22, 2020): e4524. http://dx.doi.org/10.1002/dac.4524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yan, Zheng, Peng Zhang, and Athanasios V. Vasilakos. "A security and trust framework for virtualized networks and software-defined networking." Security and Communication Networks 9, no. 16 (March 26, 2015): 3059–69. http://dx.doi.org/10.1002/sec.1243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bakhshi, Taimur. "State of the Art and Recent Research Advances in Software Defined Networking." Wireless Communications and Mobile Computing 2017 (2017): 1–35. http://dx.doi.org/10.1155/2017/7191647.

Full text
Abstract:
Emerging network services and subsequent growth in the networking infrastructure have gained tremendous momentum in recent years. Application performance requiring rapid real-time network provisioning, optimized traffic management, and virtualization of shared resources has induced the conceptualization and adoption of new networking models. Software defined networking (SDN), one of the predominant and relatively new networking paradigms, seeks to simplify network management by decoupling network control logic from the underlying hardware and introduces real-time network programmability enabling innovation. The present work reviews the state of the art in software defined networking providing a historical perspective on complementary technologies in network programmability and the inherent shortcomings which paved the way for SDN. The SDN architecture is discussed along with popular protocols, platforms, and existing simulation and debugging solutions. Furthermore, a detailed analysis is presented around recent SDN development and deployment avenues ranging from mobile communications and data centers to campus networks and residential environments. The review concludes by highlighting implementation challenges and subsequent research directions being pursued in academia and industry to address issues related to application performance, control plane scalability and design, security, and interdomain connectivity in the context of SDN.
APA, Harvard, Vancouver, ISO, and other styles
49

Prasad, B. V. V. S., and Sd Salman Ali. "Software – defined networking based secure rout-ing in mobile ad hoc network." International Journal of Engineering & Technology 7, no. 1.2 (December 28, 2017): 229. http://dx.doi.org/10.14419/ijet.v7i1.2.9288.

Full text
Abstract:
Traditional communication networks can be leveraged by separating controlling functions from forwarding functions using emerging technology known as Software Defined Networking (SDN). Though SDN has been around for some years, it was mostly limited to wired networks. Of late, it is being adapted to wireless networks. The programmable interface with decoupled controller can be used with MANET to integrate with other networks besides controlling it well. Both control and security are inevitable for the successful implementation of SDN in wireless networks. Towards this end, in this paper we implemented SDN based MANET for secure routing. Open Flow is used for implementing SDN controller while IDC is used for securing communications. Our framework is evaluated with NS3 simulations that reveal significant performance improvement when compared with traditional ad hoc networks that do not use SDN. This is achieved as SDN controller can quickly adapt to changed topologies due to node mobility.
APA, Harvard, Vancouver, ISO, and other styles
50

Kalkan, Kubra, and Sherali Zeadally. "Securing Internet of Things with Software Defined Networking." IEEE Communications Magazine 56, no. 9 (September 2018): 186–92. http://dx.doi.org/10.1109/mcom.2017.1700714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography