Safeguarding Software-Defined Networks: Comprehensive Frameworks and Best Practices for Security Threat Mitigation

被引:0
|
作者
Verma, Jyoti [1 ]
Snehi, Manish [1 ]
Kansa, Isha [1 ]
Kumar, Rajiv [2 ]
Goel, Kanu [3 ]
Singh, Ranvijay [4 ]
机构
[1] Punjabi Univ, Dept Comp Sci & Engn, Patiala, India
[2] Chitkara Univ, Inst Engn & Technol, Rajpura, Punjab, India
[3] Punjab Engn Coll Deemed Univ, Chandigarh, India
[4] Chandigarh Univ, Univ Ctr Res & Dev, Dept Mech Engn, Mohali, Punjab, India
关键词
Centralized management; interoperability; scalability; security challenges; software-defined networking; SDN; FOG NODE; CHALLENGES; INTERNET; THINGS; BLOCKCHAIN; SYSTEM; TRENDS;
D O I
10.2174/0123520965273025231121173901
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The proliferation of IoT devices such as sensors, actuators, sensors, and other endpoints has resulted in a significant surge in data generation. Ensuring the security and efficiency of data transmission necessitates the implementation of an internet design that possesses the capability to scale as required. This study investigates the potential impact of SDN on enhancing the performance of IoT networks. This study examines the ability to adapt network resources in real-time to meet the demands of IoT applications. It is imperative to address the security vulnerabilities in the SDN architecture to ensure secure and reliable network operations. This paper thoroughly examines the challenges, various security solutions, and recommended practices for effectively protecting SDN infrastructures. This study comprehensively analyzes the pertinent scholarly works, conducts a comparative analysis of diverse security approaches, and assesses their respective advantages and limitations. The need for further investigation into the security aspects of SDN is also acknowledged. This article highlights the importance of enhancing security practices, implementing continuous monitoring, and identifying potential threats. Additionally, it presents case studies that exemplify real-world security challenges associated with SDN. Further, this study incorporates security solutions into SDN frameworks, emphasizing the significance of meticulous strategic preparation, comprehensive testing, and ongoing upkeep to ensure seamless interoperability with current systems. This study is significant as it contributes to the expanding literature on security in SDN. The comprehensive examination of existing literature, meticulous analysis, thorough review of security approaches, identification of issues and limitations, and exploration of potential avenues for future research in this work render it a valuable resource for researchers and practitioners investigating SDN security. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study provides comprehensive information on implementation, testbed settings, datasets, and experimental procedures to promote transparency and repeatability. The study presents findings from extensive testing and benchmarking, showcasing the effectiveness of security solutions in addressing different types of threats. The study focuses on achieving a harmonious equilibrium between accuracy and efficient utilization of resources. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study includes comprehensive information on implementation, testbed configuration, datasets, and experimental procedures to promote transparency and reproducibility. The study presents empirical evidence and analysis to support the effectiveness of security solutions in addressing different types of threats. It specifically focuses on achieving a trade-off between accuracy and efficient use of resources.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] A survey on software-defined vehicular networks (SDVNs): a security perspective
    Kumar, Rohit
    Agrawal, Neha
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (08): : 8368 - 8400
  • [32] Automated Verification of Security Chains in Software-Defined Networks with Synaptic
    Schnepf, Nicolas
    Badonnel, Remi
    Lahmadi, Abdelkader
    Merz, Stephan
    2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
  • [33] A security and trust framework for virtualized networks and software-defined networking
    Yan, Zheng
    Zhang, Peng
    Vasilakos, Athanasios V.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3059 - 3069
  • [34] Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
    Hirsi, Abdinasir
    Alhartomi, Mohammed A.
    Audah, Lukman
    Salh, Adeb
    Sahar, Nan Mad
    Ahmed, Salman
    Ansa, Godwin Okon
    Farah, Abdullahi
    IEEE ACCESS, 2025, 13 : 23013 - 23071
  • [35] Collaborative Security Attack Detection in Software-Defined Vehicular Networks
    Kim, Myeongsu
    Jang, Insun
    Choo, Sukjin
    Koo, Jungwoo
    Pack, Sangheon
    2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS, 2017, : 19 - 24
  • [36] A Collaborative Security Framework for Software-Defined Wireless Sensor Networks
    Miranda, Christian
    Kaddoum, Georges
    Bou-Harb, Elias
    Garg, Sahil
    Kaur, Kuljeet
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2602 - 2615
  • [37] A survey on software-defined vehicular networks (SDVNs): a security perspective
    Rohit Kumar
    Neha Agrawal
    The Journal of Supercomputing, 2023, 79 : 8368 - 8400
  • [38] A Policy-Based Security Architecture for Software-Defined Networks
    Varadharajan, Vijay
    Karmakar, Kallol
    Tupakula, Uday
    Hitchens, Michael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 897 - 912
  • [39] A comprehensive approach for optimizing controller placement in Software-Defined Networks
    Schutz, G.
    Martins, J. A.
    COMPUTER COMMUNICATIONS, 2020, 159 : 198 - 205
  • [40] A comprehensive overview of load balancing methods in software-defined networks
    Rasoul Farahi
    Discover Internet of Things, 5 (1):