Open Access Open Access  Restricted Access Subscription or Fee Access

Security of Software Defined Network

Sumit Mathur, Lokesh Bhutani

Abstract


Software Defined Networking (SDN) might be a particular methodology that allows the system to be brilliantly and midway controlled, or 'modified,' utilizing programming applications. Software Defined networks technology can help to run on-demand applications for satisfying today’s business needs that is the reason for its extensive use in mostly data center .Software defined network, i.e. SDN provides clear view of whole network architecture to the network administrator. It isolates the system's control and sending capacities to such an extent that the physical and legitimate systems can be dealt with autonomously. This helps operators manage the whole network consistently and holistically, no matter the underlying network technology. This method allows the network traffic to flow according to the changing needs of the business without changing in the network’s architecture. As we see in the modern time the network becomes more complex and managing all these networks by using traditional networking approaches is quite difficult. Software defined network is a better approach for handling large network and using all the network component efficiently. To accomplish a far reaching organization SDNs these systems found a good pace against inner and outer abuse. Compromised controllers, end hosts and switches can be easily exploited to launch a number of attacks against the network. In this work we emphasize on number of security attacks on the network and how we secure our networks from these attacks.


Keywords


- (SDN), controllers, security attacks, (DoS), systems.

Full Text:

PDF

References


D. Kreutz, F. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg,

S. Azodolmolky, and S. Uhlig, “Software-Defined Networking: A Com- prehensive Survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, Jan 2015.

S. Scott-Hayward, G. O’Callaghan, and S. Sezer, “SDN Security: A Survey,” in Future Networks and Services (SDN4FNS), 2013 IEEE SDN for, Nov 2013, pp. 1–7.

S. Hong, L. Xu, H. Wang, and G. Gu, “Poisoning Network Visibility in Software- Defined Networks: New Attacks and Countermeasures,” in Proceedings of 2015 Annual Network and Distributed System Security Symposium (NDSS’15), February 2015.

M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, “SPHINX: Detecting Security Attacks in Software-Defined Networks,” in 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015.

X. Z. Xiaodong Du, Ming-Zhong Wang and L. Zhu, “Traffic-based Malicious Switch Detection in SDN,” in International Journal of Security and Its Applications, pp. 119– 130.

K. Benton, L. J. Camp, and C. Small. Openflow vulnerability assessment. In Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN’13), August 2013.

Configuring port security. http://www.cisco.com/c/en/us/td/docs/ switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port sec. html.

D. Raffo C. Adjih and P. Mhlethaler. Attacks against olsr: Distributed key management for security. In 2005 OLSR Interop and Workshop, July 2005.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Microcontroller Engineering and Applications