2022
DOI: 10.1002/cpe.6978
|View full text |Cite
|
Sign up to set email alerts
|

An extensive vulnerability assessment and countermeasures in open network operating system software defined networking controller

Abstract: Software defined networking (SDN) is the technology that has changed the design and deployment architecture of networks with its benefits like centralization, application awareness, programmability and so forth. But security is one aspect, which needs to be continuously revised according to the new vulnerabilities or bugs found in the network.In this article, penetration testing or vulnerability assessment has been performed on ONOS SDN controller with both single and clustered controller environments. Penetra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 69 publications
0
2
0
Order By: Relevance
“…Likewise, given the specific conceptualization of the SDN, which is based on the centralization of network management by a single control plane, the integration of IoT devices in the SDN also requires the need for robust detection mechanisms of the DDoS attacks, which can be adapted to the dynamic nature of IoT traffic. 12,13 DDoS is a cyberattack that involves flooding a network, a website, or an online service with massive amounts of traffic from various sources to disrupt normal operations. 14 Typically, the attacker employs a network of compromised devices, called a botnet, to carry out the attack, rendering the targeted system unavailable to legitimate users.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Likewise, given the specific conceptualization of the SDN, which is based on the centralization of network management by a single control plane, the integration of IoT devices in the SDN also requires the need for robust detection mechanisms of the DDoS attacks, which can be adapted to the dynamic nature of IoT traffic. 12,13 DDoS is a cyberattack that involves flooding a network, a website, or an online service with massive amounts of traffic from various sources to disrupt normal operations. 14 Typically, the attacker employs a network of compromised devices, called a botnet, to carry out the attack, rendering the targeted system unavailable to legitimate users.…”
Section: Introductionmentioning
confidence: 99%
“…However, the massive scale and the heterogeneity of IoT networks make them vulnerable to various security threats, such as Distributed Denial of Service attacks (DDoS), 11 which can compromise the availability and performance of critical IoT services. Likewise, given the specific conceptualization of the SDN, which is based on the centralization of network management by a single control plane, the integration of IoT devices in the SDN also requires the need for robust detection mechanisms of the DDoS attacks, which can be adapted to the dynamic nature of IoT traffic 12,13 …”
Section: Introductionmentioning
confidence: 99%