Safeguarding Software-Defined Networks: Comprehensive Frameworks and Best Practices for Security Threat Mitigation

被引:0
|
作者
Verma, Jyoti [1 ]
Snehi, Manish [1 ]
Kansa, Isha [1 ]
Kumar, Rajiv [2 ]
Goel, Kanu [3 ]
Singh, Ranvijay [4 ]
机构
[1] Punjabi Univ, Dept Comp Sci & Engn, Patiala, India
[2] Chitkara Univ, Inst Engn & Technol, Rajpura, Punjab, India
[3] Punjab Engn Coll Deemed Univ, Chandigarh, India
[4] Chandigarh Univ, Univ Ctr Res & Dev, Dept Mech Engn, Mohali, Punjab, India
关键词
Centralized management; interoperability; scalability; security challenges; software-defined networking; SDN; FOG NODE; CHALLENGES; INTERNET; THINGS; BLOCKCHAIN; SYSTEM; TRENDS;
D O I
10.2174/0123520965273025231121173901
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The proliferation of IoT devices such as sensors, actuators, sensors, and other endpoints has resulted in a significant surge in data generation. Ensuring the security and efficiency of data transmission necessitates the implementation of an internet design that possesses the capability to scale as required. This study investigates the potential impact of SDN on enhancing the performance of IoT networks. This study examines the ability to adapt network resources in real-time to meet the demands of IoT applications. It is imperative to address the security vulnerabilities in the SDN architecture to ensure secure and reliable network operations. This paper thoroughly examines the challenges, various security solutions, and recommended practices for effectively protecting SDN infrastructures. This study comprehensively analyzes the pertinent scholarly works, conducts a comparative analysis of diverse security approaches, and assesses their respective advantages and limitations. The need for further investigation into the security aspects of SDN is also acknowledged. This article highlights the importance of enhancing security practices, implementing continuous monitoring, and identifying potential threats. Additionally, it presents case studies that exemplify real-world security challenges associated with SDN. Further, this study incorporates security solutions into SDN frameworks, emphasizing the significance of meticulous strategic preparation, comprehensive testing, and ongoing upkeep to ensure seamless interoperability with current systems. This study is significant as it contributes to the expanding literature on security in SDN. The comprehensive examination of existing literature, meticulous analysis, thorough review of security approaches, identification of issues and limitations, and exploration of potential avenues for future research in this work render it a valuable resource for researchers and practitioners investigating SDN security. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study provides comprehensive information on implementation, testbed settings, datasets, and experimental procedures to promote transparency and repeatability. The study presents findings from extensive testing and benchmarking, showcasing the effectiveness of security solutions in addressing different types of threats. The study focuses on achieving a harmonious equilibrium between accuracy and efficient utilization of resources. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study includes comprehensive information on implementation, testbed configuration, datasets, and experimental procedures to promote transparency and reproducibility. The study presents empirical evidence and analysis to support the effectiveness of security solutions in addressing different types of threats. It specifically focuses on achieving a trade-off between accuracy and efficient use of resources.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] DELTA: A Security Assessment Framework for Software-Defined Networks
    Lee, Seungsoo
    Yoon, Changhoon
    Lee, Chanhee
    Shin, Seungwon
    Yegneswaran, Vinod
    Porras, Phillip
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [22] Deep learning for the security of software-defined networks: a review
    Roya Taheri
    Habib Ahmed
    Engin Arslan
    Cluster Computing, 2023, 26 : 3089 - 3112
  • [23] SPHINX: Detecting Security Attacks in Software-Defined Networks
    Dhawan, Mohan
    Poddar, Rishabh
    Mahajan, Kshiteej
    Mann, Vijay
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [24] Deep learning for the security of software-defined networks: a review
    Taheri, Roya
    Ahmed, Habib
    Arslan, Engin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (05): : 3089 - 3112
  • [25] Security and performance of software-defined networks and functions virtualization
    Hausheer, David
    Hohlfeld, Oliver
    Schmid, Stefan
    Gu, Guofei
    COMPUTER NETWORKS, 2018, 138 : 15 - 17
  • [26] ANCHOR: Logically Centralized Security for Software-Defined Networks
    Kreutz, Diego
    Yu, Jiangshan
    Ramos, Fernando M. V.
    Esteves-Verissimo, Paulo
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2019, 22 (02)
  • [27] On the fine-grained fingerprinting threat to software-defined networks
    Hou, Jianwei
    Zhang, Minjian
    Zhang, Ziqi
    Shi, Wenchang
    Qin, Bo
    Liang, Bin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 485 - 497
  • [28] Packet Injection Exploiting Attack and Mitigation in Software-Defined Networks
    Li, Jishuai
    Qin, Sujuan
    Tu, Tengfei
    Zhang, Hua
    Li, Yongsheng
    APPLIED SCIENCES-BASEL, 2022, 12 (03):
  • [29] A Software Approach for Mitigation of DoS Attacks on SDN's (Software-Defined Networks)
    Lotlikar, Trupti
    Shah, Deven
    SOFT COMPUTING IN DATA ANALYTICS, SCDA 2018, 2019, 758 : 333 - 342
  • [30] Opportunities and Challenges of Software-Defined Mobile Networks in Network Security
    Liyanage, Madhusanka
    Abro, Ahmed Bux
    Ylianttila, Mika
    Gurtov, Andrei
    IEEE SECURITY & PRIVACY, 2016, 14 (04) : 34 - 44