2015
DOI: 10.1007/s40860-015-0008-0
|View full text |Cite
|
Sign up to set email alerts
|

Modelling cyber security for software-defined networks those grow strong when exposed to threats

Abstract: With each passing day, the information and communication technologies are evolving with more and more information shared across the globe using the internet superhighway. The threats to information, while connected to the cyber world are getting more targeted, voluminous, and sophisticated requiring new antifragile and resilient network security mechanisms. Whether the information is being processed in the application, in transit within the network or residing in the storage, it is equally susceptible to attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 43 publications
0
6
0
Order By: Relevance
“…Computer networks [71] The structure of software-defined networks (SDNs) is subject to serious threats. The authors reflected the need to introduce a new approach to the consideration of cybersecurity in the framework of SDNs.…”
Section: Name Of the Property Publication A Brief Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Computer networks [71] The structure of software-defined networks (SDNs) is subject to serious threats. The authors reflected the need to introduce a new approach to the consideration of cybersecurity in the framework of SDNs.…”
Section: Name Of the Property Publication A Brief Descriptionmentioning
confidence: 99%
“…Analyzing the sources of the above table, we can say that in [69,78,80,83,85,86] the authors built schematic models to demonstrate their usefulness, and in [71,[73][74][75][76][77]81,82,84,[87][88][89][90] the authors cited models either existing, described in words or only mathematically. This approach may not be clear to everyone, and may also cause difficulties.…”
Section: Name Of the Property Publication A Brief Descriptionmentioning
confidence: 99%
“…However, it introduces vulnerabilities that do not exist in conventional networks. Seven main threat vector were defined by the authors in [76], (1) threats on control plane communication, (2) forged or fake traffic flows, trust between the controller and the applications, (4) trusted resources for forensics and remediation, (5) threats on vulnerabilities in switches, (6) threats on vulnerabilities in controllers, and (7) vulnerabilities in admin station. While the integration of the entire network management and configuration in a centralized SDN controller is considered a single point of failure.…”
Section: Rq2: What Are the Latest Studies Of Botnet Detection Based On Machine Learning?mentioning
confidence: 99%
“…The analysis of publications [87][88][89][90][91] concerning the cyber security of SDN has allowed the allocation of the top 10 threats generated by its vulnerabilities. The results of this qualitative analysis, according to Step 2 of the algorithm, are given in Table 3.…”
Section: Top 10 Sdiov Cyber Threatsmentioning
confidence: 99%