10th International Conference on Network and Service Management (CNSM) and Workshop 2014
DOI: 10.1109/cnsm.2014.7014199
|View full text |Cite
|
Sign up to set email alerts
|

Blessing or curse? Revisiting security aspects of Software-Defined Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(37 citation statements)
references
References 21 publications
0
32
0
Order By: Relevance
“…Networks running under the SDN paradigm still have the same security requirements as traditional network settings, as it is likely that they will be carrying at times, private and confidential information [7]. SDN completely changes the architecture and the inter-communicative aspects of the components in the network -from this arises a completely new platform for attackers looking to perform security-breaching attacks.…”
Section: Threats To Security In Sdn Environmentsmentioning
confidence: 99%
“…Networks running under the SDN paradigm still have the same security requirements as traditional network settings, as it is likely that they will be carrying at times, private and confidential information [7]. SDN completely changes the architecture and the inter-communicative aspects of the components in the network -from this arises a completely new platform for attackers looking to perform security-breaching attacks.…”
Section: Threats To Security In Sdn Environmentsmentioning
confidence: 99%
“…In the following we discuss these in detail. Availability: Schehlmann et al [63] state that the availability of the network controller can compromise the correct operation of network functions. To address the availability aspects of the network controller with respect to security, Li et al [60] propose a novel SDN architecture based on BFT (Byzantine Fault Tolerant) [67] mechanisms to withstand malicious attacks on the control plane.…”
Section: Securitymentioning
confidence: 99%
“…Switch level security in [42] is improved with spam detection, packet inspection and intrusion detection. www.ijacsa.thesai.org Research work in [16]- [17], [33], [41] provide countermeasures to security issues with control layer. They have more impact on security with automatic user authentication [16], virtual IP allocated to host [17], monitoring with varied granularity [18], avoidance of conflicts in rules [33], and with detection and tracking capabilities [37].…”
Section: Security Control In Multiple Layersmentioning
confidence: 99%
“…Scripting language used in development of security applications. Controller program for monitoring and configuration of policies [40], an advance language for network policies for control architecture Procera [41], and network security policy in human readable language for responding to alerts in OpenSec framework [42] represent few of the research work in policy language.…”
Section: B Enforcing Network Wide Security Policiesmentioning
confidence: 99%