2023
DOI: 10.3991/ijim.v17i02.36387
|View full text |Cite
|
Sign up to set email alerts
|

Proposed Multi-Layer Firewall to Improve the Security of Software Defined Networks

Abstract: one of the most important motivations behind the use of software-defined networking (SDN) is the desire to move from the approach of traditional networks to a more flexible and intelligent software development technology. This paper focuses on the importance of the SDN-based platform POX controller security firewall modules and its effectiveness on networks including the central administration of the SDN-based platform controller for protecting the network from possible attacks. The work is performed using the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The benefits of packet filtering firewalls as a network security solution are their low complexity, low cost, high speed, low resource consumption, predictability, and determinism. However, it has drawbacks, such as being ineffective against modern attacks, being vulnerable to spoofing, being unable to make decisions based on application or authentication, and rule lists growing too large to manage [63]. Existing packet classification methods still have issues with poor classification performance and huge storage space despite the fact that a lot of research has been conducted in this field.…”
Section: Methodsmentioning
confidence: 99%
“…The benefits of packet filtering firewalls as a network security solution are their low complexity, low cost, high speed, low resource consumption, predictability, and determinism. However, it has drawbacks, such as being ineffective against modern attacks, being vulnerable to spoofing, being unable to make decisions based on application or authentication, and rule lists growing too large to manage [63]. Existing packet classification methods still have issues with poor classification performance and huge storage space despite the fact that a lot of research has been conducted in this field.…”
Section: Methodsmentioning
confidence: 99%
“…Act as a first line of defense by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules [96]. They help prevent unauthorized access and protect against external threats [97]- [100].…”
Section: Firewallsmentioning
confidence: 99%
“…3 . NF misleading attack: The packet can be used by a switch or VNF that has been compromised, modifying capabilities to trick the security services and let outside malicious traffic into the network 9 . The misleading attack by the NF is depicted in Fig.…”
Section: Introductionmentioning
confidence: 99%