Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-319-49148-6_27guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Security in Software-Defined-Networking: A Survey

Published: 16 November 2016 Publication History

Abstract

With the development of information and networking technologies, conventional network has been unable to meet the demands of practical applications and network users. A new network paradigm called Software-Defined Networking (SDN) was proposed and got public attention. By decoupling the forwarding and control planes and applying specific protocols, SDN greatly reduces the cost of network management. Moreover, SDN empowers network managers to program their networks with high flexibility. However, there are many network security issues with regard to SDN, which should be solved in order to ensure the final success of SDN. In this paper, we undertake an SDN security survey. We focus on analyzing SDN’s security problems and reviewing existing countermeasures. Meanwhile, we identify the future research directions of SDN security.

References

[1]
Kreutz D, Ramos FM, Verissimo PE, and Rothenberg CE Software-defined networking: a comprehensive survey Proc. IEEE 2015 103 1 14-76
[2]
Ali ST, Sivaraman V, Radford A, and Jha S A survey of securing networks using software defined networking IEEE Trans. Reliab. 2015 64 3 1086-1097
[3]
Hawilo H, Shami A, Mirahmadi M, and Asal R NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC) IEEE Netw. 2014 28 6 18-26
[4]
Scott-Hayward S, Natarajan S, and Sezer S A survey of security in software defined networks IEEE Commun. Surv. Tutorials 2016 18 1 623-654
[5]
Dotcenko, S., Vladyko, A., Letenko, I.: A fuzzy logic-based information security management for software-defined networks. In: 16th International Conference on Advanced Communication Technology, pp. 167–171 (2014)
[6]
Klaedtke, F., Karame, G.O., Bifulco, R., Cui, H.: Access control for SDN controllers. In: 3rd Workshop on Hot Topics in Software Defined Networking, pp. 219–220 (2014)
[7]
Hu, H., Han, W., Ahn, G.J., Zhao, Z.: FLOWGUARD: building robust firewalls for software-defined networks. In: 3rd Workshop on Hot Topics in Software Defined Networking, pp. 97–102 (2014)
[8]
Shin, S., Porras, P.A., Yegneswaran, V., Fong, M.W., Gu, G., Tyson, M.: FRESCO: modular composable security services for software-defined networks. In: The ISOC Network and Distributed System Security Symposium, pp. 1–16 (2013)
[9]
Lim, S., Ha, J., Kim, H., Kim, Y., Yang, S.: A SDN-oriented DDoS blocking scheme for botnet-based attacks. In: Sixth International Conference on Ubiquitous and Future Networks, pp. 63–68 (2014)
[10]
Lim S, Yang S, Kim Y, Yang S, and Kim H Controller scheduling for continued SDN operation under DDoS attacks Electron. Lett. 2015 51 16 1259-1261
[11]
Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computing Networking and Communications (ICNC), pp. 77–81 (2015)
[12]
Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: 35th Annual IEEE Conference on Local Computer Networks, pp. 408–415 (2010)
[13]
Oktian, Y.E., Lee, S., Lee, H.: Mitigating denial of service (DoS) attacks in openflow networks. In: 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 325–330 (2014)
[14]
Belyaev, M., Gaivoronski, S.: Towards load balancing in SDN-networks during DDoS-attacks. In: 2014 International Science and Technology Conference, pp. 1–6 (2014)
[15]
Dabbagh M, Hamdaoui B, Guizani M, and Rayes A Software-defined networking security: pros and cons IEEE Commun. Mag. 2015 53 6 73-79
[16]
Scott-Hayward, S., Kane, C., Sezer, S.: OperationCheckpoint: SDN application control. In: 2014 IEEE 22nd International Conference on Network Protocols, pp. 618–623 (2014)
[17]
Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 55–60 (2013)
[18]
Chandrasekaran, B., Benson, T.: Tolerating SDN application failures with LegoSDN. In: 13th ACM Workshop on Hot Topics in NetworYks, pp. 22–28 (2014)
[19]
Ferguson AD, Guha A, Liang C, Fonseca R, and Krishnamurthi S Participatory networking: an API for application control of SDNs ACM SIGCOMM Comput. Commun. Rev. 2013 43 4 327-338
[20]
Shin, M.K., Nam, K.H., Kim, H.J.: Software-defined networking (SDN): a reference architecture and open APIs. In: 2012 International Conference on ICT Convergence (ICTC), pp. 360–361 (2012)
[21]
Tootoonchian, A., Ganjali, Y.: HyperFlow: a distributed control plane for OpenFlow. In: 2010 Internet Network Management Conference on Research on Enterprise Networking, pp. 3–6 (2010)
[22]
Yan Q and Yu FR Distributed denial of service attacks in software-defined networking with cloud computing IEEE Commun. Mag. 2015 53 4 52-59

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Security, Privacy, and Anonymity in Computation, Communication, and Storage: 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings
Nov 2016
523 pages
ISBN:978-3-319-49147-9
DOI:10.1007/978-3-319-49148-6
  • Editors:
  • Guojun Wang,
  • Indrakshi Ray,
  • Jose M. Alcaraz Calero,
  • Sabu M. Thampi

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 16 November 2016

Author Tags

  1. Software-Defined Networking
  2. Network security
  3. Network intrusion
  4. Denial of Service
  5. Network management

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media