A survey and classification of the security anomaly detection mechanisms in software defined networks

被引:34
|
作者
Jafarian, Tohid [1 ]
Masdari, Mohammad [1 ]
Ghaffari, Ali [2 ]
Majidzadeh, Kambiz [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Urmia Branch, Orumiyeh, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Tabriz Branch, Tabriz, Iran
关键词
Sdns; OpenFlow; Anomaly detection; Data plane; Security challenges; Virtual networks; FLOW; MITIGATION; TAXONOMY; SDN;
D O I
10.1007/s10586-020-03184-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software defined network (SDN) decouples the network control and data planes. Despite various advantages of SDNs, they are vulnerable to various security attacks such anomalies, intrusions, and Denial-of-Service (DoS) attacks and so on. On the other hand, any anomaly and intrusion in SDNs can affect many important domains such as banking system and national security. Therefore, the anomaly detection topic is a broad research domain, and to mitigate these security problems, a great deal of research has been conducted in the literature. In this paper, the state-of-the-art schemes applied in detecting and mitigating anomalies in SDNs are explained, categorized, and compared. This paper categorizes the SDN anomaly detection mechanisms into five categories: (1) flow counting scheme, (2) information-based scheme, (3) entropy-based scheme, (4) deep learning, and (5) hybrid scheme. The research gaps and major existing research issues regarding SDN anomaly detection are highlighted. We hope that the analyses, comparisons, and classifications might provide directions for further research.
引用
收藏
页码:1235 / 1253
页数:19
相关论文
共 50 条
  • [21] On the Security of Software-Defined Networks
    Prasad, Abhinandan S.
    Koll, David
    Fu, Xiaoming
    [J]. 2015 FOURTH EUROPEAN WORKSHOP ON SOFTWARE DEFINED NETWORKS - EWSDN 2015, 2015, : 105 - 106
  • [22] The (In)Security of Virtualization in Software Defined Networks
    Alharbi, Talal
    Portmann, Marius
    [J]. IEEE ACCESS, 2019, 7 : 66584 - 66594
  • [23] Taxonomy of traffic engineering mechanisms in software-defined networks: a survey
    Ramin Mohammadi
    Sedat Akleylek
    Ali Ghaffari
    Alireza Shirmarz
    [J]. Telecommunication Systems, 2022, 81 : 475 - 502
  • [24] Collaborative Security Attack Detection in Software-Defined Vehicular Networks
    Kim, Myeongsu
    Jang, Insun
    Choo, Sukjin
    Koo, Jungwoo
    Pack, Sangheon
    [J]. 2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS, 2017, : 19 - 24
  • [25] Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks
    Zhang, Peng
    Zhang, Fangzheng
    Xu, Shimin
    Yang, Zuoru
    Li, Hao
    Li, Qi
    Wang, Huanzhao
    Shen, Chao
    Hu, Chengchen
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (01) : 332 - 345
  • [26] LOADS: Load Optimization and Anomaly Detection Scheme for Software-Defined Networks
    Chaudhary, Rajat
    Kumar, Neeraj
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (12) : 12329 - 12344
  • [27] Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks
    Zacaron, Alexandro Marcelo
    Lent, Daniel Matheus Brandao
    da Silva Ruffo, Vitor Gabriel
    Carvalho, Luiz Fernando
    Proenca Jr, Mario Lemes
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (04)
  • [28] Anomaly Detection in Software-Defined Networks Using Cross-Validation
    Krzemien, W.
    Jedrasiak, K.
    Nawrat, A.
    Daniec, K.
    [J]. INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 250 - 256
  • [29] Demonstrating State-based Security Protection Mechanisms in Software Defined Networks
    Arumugam, Thianantha
    Scott-Hayward, Sandra
    [J]. PROCEEDINGS OF THE 2017 8TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2017, : 123 - 125
  • [30] A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
    Li, Wenjuan
    Meng, Weizhi
    Kwok, Lam For
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 : 126 - 139