The Application of Software-Defined Networking On Secure Computer Networks
DOI:
https://doi.org/10.32792/jeps.v10i1.49Keywords:
Software define network, Open Flows Dos, Defenders SecurityAbstract
In this paper, we analyze the dos risk within the Software-Defined Networking structure to look atextenuation strategies. SDN assaults are observed remember normally about the impersonation of the
source MAC address, IP Address, and port. In addition, mitigation strategies center of attention on
buffering or scheduling policies. It can't stop assaults out of coming into the community then necessity
additional hardware. To give up rejection concerning work assaults concentrated on SDN beyond the
source, we propose dos defender. We appeal such between the detector power one or consider the dos
protagonist effectiveness. The empirical results show so much dos advocate do shield towards denial on
employment attacks that target SDN effectively. Although modern-day extenuation techniques between
dos cannot guard the OFA, proof trough assets then limit simultaneously, our designs are able
efficaciously barrier traffic beyond network access or soothe dos attacks. Research on software-savvy
networks is nevertheless between its short stages, or we consider such a healthy sign to that amount at
that place is already lots action in conformity with stand performed in accordance with boost latter
revolutionary safety options and applications because it networks. We performed a stark comment about
safety-oriented research among software-defined networks. We bear classified the present day labor
within couple foremost streams: Threat detection, cure, and fitness so simplify yet enhance the protection
of programmable networks yet security service, supplying current innovative security performance to
users, certain as like identity then community management. In computing, we think about dynamic
challenges yet future protection developments among SDN: This consists of the necessary issue of
securing SDN itself, out of regulating security policies across heterogeneous networks, customizing
overlay networks to furnish tightly closed environments, expanding the originate glide mannequin
together with hardware then community customization and virtualization applications Richer than the
services among the redirection path.
References
H. Farhady, H. Lee, and A. Nakao, “Software-Defined Networking: A survey,” Computer
Networks. 2015.
D. Kreutz, F. M. V. Ramos, and P. Verissimo, “Towards secure and dependable software-defined
networks,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software
defined networking - HotSDN ’13, 2013.
M. Jammal, T. Singh, A. Shami, R. Asal, and Y. Li, “Software defined networking: State of the art
and research challenges,” Computer Networks. 2014.
Z. Yao and Z. Yan, “Security in software-defined-networking: A survey,” in Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes
in Bioinformatics), 2016.
M. Kobayashi et al., “Maturing of OpenFlow and Software-defined Networking through
deployments,” Comput. Networks, 2014.
I. F. Akyildiz, A. Lee, P. Wang, M. Luo, and W. Chou, “A roadmap for traffic engineering in
software defined networks,” Comput. Networks, 2014.
A. Akhunzada et al., “Secure and dependable software defined networks,” Journal of Network and
Computer Applications. 2016.
C. Douligeris and A. Mitrokotsa, “DDoS attacks and defense mechanisms: Classification and stateof-
the-art,” Comput. Networks, 2004.
S. Misra, P. Venkata Krishna, H. Agarwal, A. Saxena, and M. S. Obaidat, “A learning automata
based solution for preventing distributed denial of service in internet of things,” in Proceedings -
IEEE International Conferences on Internet of Things and Cyber, Physical and Social
Computing, iThings/CPSCom 2011, 2011.
A. Bonguet and M. Bellaiche, “A survey of Denial-of-Service and distributed Denial of Service
attacks and defenses in cloud computing,” Futur. Internet, 2017.
H. Beitollahi and G. Deconinck, “Analyzing well-known countermeasures against distributed
denial of service attacks,” Computer Communications. 2012.
UK National Computer Emergency Response Team, “Denial of service attacks : what you need to
know,” A CERT-UK Publ., 2014.
U. Tariq, Y. Malik, and B. Abdulrazak, “Defense and monitoring model for distributed denial of
service attacks,” in Procedia Computer Science, 2012.
G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, “DDoS attacks in cloud computing:
Issues, taxonomy, and future directions,” Computer Communications. 2017.
M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, “SPHINX: Detecting Security Attacks in
Software-Defined Networks,” 2015.
H. Cui, G. O. Karame, F. Klaedtke, and R. Bifulco, “On the Fingerprinting of Software-Defined
Networks,” IEEE Trans. Inf. Forensics Secur., 2016.
E. G. Renart, E. Z. Zhang, and B. Nath, “Towards a GPU SDN controller,” in Proceedings -
International Conference on Networked Systems, NetSys 2015, 2015.
Y. hwan Kim, H. kyo Lim, K. han Kim, and Y. H. Han, “A SDN-based distributed mobility
management in LTE/EPC network,” J. Supercomput., 2017.
J. M. Sanner, M. Ouzzif, and Y. Hadjadj-Aoul, “DICES: A dynamic adaptive service-driven SDN
architecture,” in 1st IEEE Conference on Network Softwarization: Software-Defined
Infrastructures for Networks, Clouds, IoT and Services, NETSOFT 2015, 2015.
A. Sanhaji, P. Niger, P. Cadro, C. Ollivier, and A. L. Beylot, “Congestion-based API for cloud and
WAN resource optimization,” in IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and
Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services, 2016.
Downloads
Published
Issue
Section
License
Copyright Policy
Authors retain copyright of their articles published in the Journal of Education for Pure Science (JEPS).
By submitting their work, authors grant the journal a non-exclusive license to publish, distribute, and archive the article in all formats and media.
License
All articles published in JEPS are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license permits unrestricted use, distribution, and reproduction in any medium, provided that the original author(s) and the source are properly credited.
Author Rights
Authors have the right to:
-
Share their articles on personal websites, institutional repositories, and academic platforms
-
Reuse their work in future research and publications
-
Distribute the published version without restriction
Journal Rights
The journal retains the right to:
-
Publish and archive the articles
-
Include them in indexing and archiving systems such as LOCKSS and CLOCKSS
-
Promote and disseminate the published work
Responsibility
The contents of all articles are the sole responsibility of the authors. The journal, editors, and editorial board are not responsible for any errors, opinions, or statements expressed in the published articles.
Open Access Statement
JEPS provides immediate open access to its content, supporting the principle that making research freely available to the public enhances global knowledge exchange.
This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0/