Safeguarding Software-Defined Networks: Comprehensive Frameworks and Best Practices for Security Threat Mitigation

被引:0
|
作者
Verma, Jyoti [1 ]
Snehi, Manish [1 ]
Kansa, Isha [1 ]
Kumar, Rajiv [2 ]
Goel, Kanu [3 ]
Singh, Ranvijay [4 ]
机构
[1] Punjabi Univ, Dept Comp Sci & Engn, Patiala, India
[2] Chitkara Univ, Inst Engn & Technol, Rajpura, Punjab, India
[3] Punjab Engn Coll Deemed Univ, Chandigarh, India
[4] Chandigarh Univ, Univ Ctr Res & Dev, Dept Mech Engn, Mohali, Punjab, India
关键词
Centralized management; interoperability; scalability; security challenges; software-defined networking; SDN; FOG NODE; CHALLENGES; INTERNET; THINGS; BLOCKCHAIN; SYSTEM; TRENDS;
D O I
10.2174/0123520965273025231121173901
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The proliferation of IoT devices such as sensors, actuators, sensors, and other endpoints has resulted in a significant surge in data generation. Ensuring the security and efficiency of data transmission necessitates the implementation of an internet design that possesses the capability to scale as required. This study investigates the potential impact of SDN on enhancing the performance of IoT networks. This study examines the ability to adapt network resources in real-time to meet the demands of IoT applications. It is imperative to address the security vulnerabilities in the SDN architecture to ensure secure and reliable network operations. This paper thoroughly examines the challenges, various security solutions, and recommended practices for effectively protecting SDN infrastructures. This study comprehensively analyzes the pertinent scholarly works, conducts a comparative analysis of diverse security approaches, and assesses their respective advantages and limitations. The need for further investigation into the security aspects of SDN is also acknowledged. This article highlights the importance of enhancing security practices, implementing continuous monitoring, and identifying potential threats. Additionally, it presents case studies that exemplify real-world security challenges associated with SDN. Further, this study incorporates security solutions into SDN frameworks, emphasizing the significance of meticulous strategic preparation, comprehensive testing, and ongoing upkeep to ensure seamless interoperability with current systems. This study is significant as it contributes to the expanding literature on security in SDN. The comprehensive examination of existing literature, meticulous analysis, thorough review of security approaches, identification of issues and limitations, and exploration of potential avenues for future research in this work render it a valuable resource for researchers and practitioners investigating SDN security. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study provides comprehensive information on implementation, testbed settings, datasets, and experimental procedures to promote transparency and repeatability. The study presents findings from extensive testing and benchmarking, showcasing the effectiveness of security solutions in addressing different types of threats. The study focuses on achieving a harmonious equilibrium between accuracy and efficient utilization of resources. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study includes comprehensive information on implementation, testbed configuration, datasets, and experimental procedures to promote transparency and reproducibility. The study presents empirical evidence and analysis to support the effectiveness of security solutions in addressing different types of threats. It specifically focuses on achieving a trade-off between accuracy and efficient use of resources.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] A comprehensive security assessment framework for software-defined networks
    Lee, Seungsoo
    Kim, Jinwoo
    Woo, Seungwon
    Yoon, Changhoon
    Scott-Hayward, Sandra
    Yegneswaran, Vinod
    Porras, Phillip
    Shin, Seungwon
    COMPUTERS & SECURITY, 2020, 91
  • [2] On the Security of Software-Defined Networks
    Prasad, Abhinandan S.
    Koll, David
    Fu, Xiaoming
    2015 FOURTH EUROPEAN WORKSHOP ON SOFTWARE DEFINED NETWORKS - EWSDN 2015, 2015, : 105 - 106
  • [3] OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach
    Dhanalaxmi, B.
    Raju, Yeligeti
    Saritha, B.
    Sabitha, N.
    Parati, Namita
    Rao, Kandula Damodhar
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 12943 - 12963
  • [4] Software-Defined Mobile Networks Security
    Min Chen
    Yongfeng Qian
    Shiwen Mao
    Wan Tang
    Ximin Yang
    Mobile Networks and Applications, 2016, 21 : 729 - 743
  • [5] Security Evaluation in Software-Defined Networks
    Ivkic, Igor
    Thiede, Dominik
    Race, Nicholas
    Broadbent, Matthew
    Gouglidis, Antonios
    CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2022, CLOSER 2023, 2024, 1845 : 66 - 91
  • [6] Software-Defined Mobile Networks Security
    Chen, Min
    Qian, Yongfeng
    Mao, Shiwen
    Tang, Wan
    Yang, Ximin
    MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05): : 729 - 743
  • [7] Distributed threat removal in software-defined networks
    Samociuk, D.
    Chydzinski, A.
    2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 460 - 465
  • [8] A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks
    Jain, Ankit Kumar
    Shukla, Hariom
    Goel, Diksha
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 13129 - 13164
  • [9] A comprehensive analysis of threat vectors in software-defined networking
    Dahiya S.
    Sehrawat H.
    Kharb S.
    Siwach V.
    Multimedia Tools and Applications, 2024, 83 (39) : 86791 - 86832
  • [10] Improving the Routing Security in Software-Defined Networks
    Ai, Jianjian
    Guo, Zehua
    Chen, Hongchang
    Cheng, Guozhen
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (05) : 838 - 841