Skip to main content

2022 | OriginalPaper | Buchkapitel

14. Implementation of Protection Protocols for Security Threats in SDN

verfasst von : Amanpreet Singh Dhanoa

Erschienen in: Software Defined Internet of Everything

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Software-defined network (SDN) is designed to make the central network more efficient and improve the control network. Its architecture is fully controlled designed and configured as programmable. The controller of SDN controls the entire network of SDN. In this chapter, some SDN protocols are implemented to reduce security risks. So many devices are launched in the market with the new technology as per the requirement of the new era. SDN gives more benefits due to centralized control and network control programmability. The simple network uses switch and routers to manage all the client requests as a centralized network. To identify the fake links and requests by sending SPV (Stealthy Probing Verification) packets. Sometimes, it detects the fake links but does not detect them all the time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aujla, G. S., Singh, A., & Kumar, N. (2019, November 4). Adaptflow: Adaptive flow forwarding scheme for software-defined industrial networks. IEEE Internet of Things Journal, 7(7), 5843–5851.CrossRef Aujla, G. S., Singh, A., & Kumar, N. (2019, November 4). Adaptflow: Adaptive flow forwarding scheme for software-defined industrial networks. IEEE Internet of Things Journal, 7(7), 5843–5851.CrossRef
2.
Zurück zum Zitat Aujla, G. S., Garg, S., Batra, S., Kumar, N., You, I., & Sharma, V. (2019). DROpS: A demand response optimization scheme in SDN-enabled smart energy ecosystem. Information Sciences, 476, 453–473.CrossRef Aujla, G. S., Garg, S., Batra, S., Kumar, N., You, I., & Sharma, V. (2019). DROpS: A demand response optimization scheme in SDN-enabled smart energy ecosystem. Information Sciences, 476, 453–473.CrossRef
3.
Zurück zum Zitat Hussein, A., Chadad, L., Adalian, N., Chehab, A., Elhajj, I. H., & Kayssi, A. (2020). Software-Defined Networking (SDN): The security review. Journal of Cyber Security Technology, 4(1), 1–66.CrossRef Hussein, A., Chadad, L., Adalian, N., Chehab, A., Elhajj, I. H., & Kayssi, A. (2020). Software-Defined Networking (SDN): The security review. Journal of Cyber Security Technology, 4(1), 1–66.CrossRef
4.
Zurück zum Zitat Coughlin, M. (2014). A Survey of SDN Security Research. University of Colorado Boulder. Coughlin, M. (2014). A Survey of SDN Security Research. University of Colorado Boulder.
5.
Zurück zum Zitat Jose, T., & Kurian, J. (2015, December). Survey on SDN security mechanisms. International Journal of Computer Applications, 132(14), 0975-8887.CrossRef Jose, T., & Kurian, J. (2015, December). Survey on SDN security mechanisms. International Journal of Computer Applications, 132(14), 0975-8887.CrossRef
6.
Zurück zum Zitat Iqbal, M., Iqbal, F., Mohsin, F., Rizwan, M., & Ahmad, F. (2019). Security issues in Software Defined Networking (SDN): Risks, challenges and potential solutions. (IJACSA) International Journal of Advanced Computer Science and Applications, 10(10), 298–303. Iqbal, M., Iqbal, F., Mohsin, F., Rizwan, M., & Ahmad, F. (2019). Security issues in Software Defined Networking (SDN): Risks, challenges and potential solutions. (IJACSA) International Journal of Advanced Computer Science and Applications, 10(10), 298–303.
7.
Zurück zum Zitat Shin, S., Porras, P., Yegneswaran, V., Fong, M., Gu, G., & Tyson, M. (2013, February). FRESCO: Modular composable security services for software-defined networks. In 20th Annual Network & Distributed System Security Symposium. Shin, S., Porras, P., Yegneswaran, V., Fong, M., Gu, G., & Tyson, M. (2013, February). FRESCO: Modular composable security services for software-defined networks. In 20th Annual Network & Distributed System Security Symposium.
8.
Zurück zum Zitat Mehdi, S. A., Khalid, J., & Khayam, S. A. (2011). Revisiting traffic anomaly detection using software defined networking. In Proceedings of Recent Advances in Intrusion Detection. Mehdi, S. A., Khalid, J., & Khayam, S. A. (2011). Revisiting traffic anomaly detection using software defined networking. In Proceedings of Recent Advances in Intrusion Detection.
9.
Zurück zum Zitat Robertson, S., Alexander, S., Micallef, J., Pucci, J., Tanis, J., & Macera, A. (2015). CINDAM: Customized information networks for deception and attack mitigation. In IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), London, United Kingdom (pp. 114–119). Robertson, S., Alexander, S., Micallef, J., Pucci, J., Tanis, J., & Macera, A. (2015). CINDAM: Customized information networks for deception and attack mitigation. In IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), London, United Kingdom (pp. 114–119).
11.
Zurück zum Zitat Lara, A., & Ramamurthy, B. (2016). Opensec: Policy-based security using software-defined networking. IEEE Transactions on Network and Service Management, 13(1), 30–42.CrossRef Lara, A., & Ramamurthy, B. (2016). Opensec: Policy-based security using software-defined networking. IEEE Transactions on Network and Service Management, 13(1), 30–42.CrossRef
12.
Zurück zum Zitat Sahay, R., Blanc, G., Zhang, Z., Toumi, K., & Debar, H. (2017). Adaptive policy-driven attack mitigation in SDN. In Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, Belgrade, Serbia (p. 1). Sahay, R., Blanc, G., Zhang, Z., Toumi, K., & Debar, H. (2017). Adaptive policy-driven attack mitigation in SDN. In Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, Belgrade, Serbia (p. 1).
13.
Zurück zum Zitat Karmakar, K. K., Varadharajan, V., & Tupakula, U. (2017). Mitigating attacks in software defined network (SDN). In Fourth International Conference On Software Defined Systems (SDS), Valencia, Spain (pp. 112–117). Karmakar, K. K., Varadharajan, V., & Tupakula, U. (2017). Mitigating attacks in software defined network (SDN). In Fourth International Conference On Software Defined Systems (SDS), Valencia, Spain (pp. 112–117).
14.
Zurück zum Zitat Aujla, G. S., Singh, M., Bose, A., Kumar, N., Han, G., & Buyya, R. (2020). BlockSDN: Blockchain-as-a-service for software defined networking in smart city applications. IEEE Network, 34(2), 83–91.CrossRef Aujla, G. S., Singh, M., Bose, A., Kumar, N., Han, G., & Buyya, R. (2020). BlockSDN: Blockchain-as-a-service for software defined networking in smart city applications. IEEE Network, 34(2), 83–91.CrossRef
15.
Zurück zum Zitat Chen, X., Yu, S. (2016). CIPA: A collaborative intrusion prevention architecture for programmable network and SDN. Computers & Security, 58, 1–19.CrossRef Chen, X., Yu, S. (2016). CIPA: A collaborative intrusion prevention architecture for programmable network and SDN. Computers & Security, 58, 1–19.CrossRef
16.
Zurück zum Zitat Feamster, N., Rexford, J., & Zegura, E. (2013, December). The road to SDN. ACM Queue, 11(12), 20–40.CrossRef Feamster, N., Rexford, J., & Zegura, E. (2013, December). The road to SDN. ACM Queue, 11(12), 20–40.CrossRef
17.
Zurück zum Zitat Kreutz, D., Ramos, F. M., & Verissimo, P. (2013). Towards secure and dependable software-defined networks. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking HotSDN ’13 (p. 55). Kreutz, D., Ramos, F. M., & Verissimo, P. (2013). Towards secure and dependable software-defined networks. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking HotSDN ’13 (p. 55).
18.
Zurück zum Zitat Braga, R., Mota, E., & Passito, P. (2010). Lightweight DDoS Flooding attack detection using NOX/OpenFlow. In IEEE Local Computer Network Conference (pp. 408-415). IEEE. Braga, R., Mota, E., & Passito, P. (2010). Lightweight DDoS Flooding attack detection using NOX/OpenFlow. In IEEE Local Computer Network Conference (pp. 408-415). IEEE.
19.
Zurück zum Zitat Aujla, G. S., Chaudhary, R., Kaur, K., Garg, S., Kumar, N., & Ranjan, R. (2018). SAFE: SDN-assisted framework for edge–cloud interplay in secure healthcare ecosystem. IEEE Transactions on Industrial Informatics, 15(1), 469–480.CrossRef Aujla, G. S., Chaudhary, R., Kaur, K., Garg, S., Kumar, N., & Ranjan, R. (2018). SAFE: SDN-assisted framework for edge–cloud interplay in secure healthcare ecosystem. IEEE Transactions on Industrial Informatics, 15(1), 469–480.CrossRef
20.
Zurück zum Zitat Singh, M., Aujla, G. S., Singh, A., Kumar, N., & Garg, S. (2020). Deep-learning-based blockchain framework for secure software-defined industrial networks. IEEE Transactions on Industrial Informatics, 17(1), 606–616.CrossRef Singh, M., Aujla, G. S., Singh, A., Kumar, N., & Garg, S. (2020). Deep-learning-based blockchain framework for secure software-defined industrial networks. IEEE Transactions on Industrial Informatics, 17(1), 606–616.CrossRef
21.
Zurück zum Zitat Scott-Hayward, S., O’Callaghan, G., & Sezer, S. (2013). SDN security: A survey. In 2013 IEEE SDN For Future Networks and Services (SDN4FNS) (pp. 1–7). IEEE. Scott-Hayward, S., O’Callaghan, G., & Sezer, S. (2013). SDN security: A survey. In 2013 IEEE SDN For Future Networks and Services (SDN4FNS) (pp. 1–7). IEEE.
22.
Zurück zum Zitat Kreutz, D., Ramos, F. M. V., & Verissimo, P. (2013, August). Towards secure and dependable software defined networks. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (pp. 55–60). Kreutz, D., Ramos, F. M. V., & Verissimo, P. (2013, August). Towards secure and dependable software defined networks. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (pp. 55–60).
Metadaten
Titel
Implementation of Protection Protocols for Security Threats in SDN
verfasst von
Amanpreet Singh Dhanoa
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-89328-6_14

Premium Partner