The Application of Software-Defined Networking On Secure Computer Networks

Authors

  • Hind Fadhil Abbas Asstant lecturer, college of Education for pure science, University of Thiqar
  • Wafaa Ali Abdulhussein Alrikabi Asstant lecturer, college of Education for pure science, University of Thiqar

DOI:

https://doi.org/10.32792/jeps.v10i1.49

Keywords:

Software define network, Open Flows Dos, Defenders Security

Abstract

In this paper, we analyze the dos risk within the Software-Defined Networking structure to look at
extenuation strategies. SDN assaults are observed remember normally about the impersonation of the
source MAC address, IP Address, and port. In addition, mitigation strategies center of attention on
buffering or scheduling policies. It can't stop assaults out of coming into the community then necessity
additional hardware. To give up rejection concerning work assaults concentrated on SDN beyond the
source, we propose dos defender. We appeal such between the detector power one or consider the dos
protagonist effectiveness. The empirical results show so much dos advocate do shield towards denial on
employment attacks that target SDN effectively. Although modern-day extenuation techniques between
dos cannot guard the OFA, proof trough assets then limit simultaneously, our designs are able
efficaciously barrier traffic beyond network access or soothe dos attacks. Research on software-savvy
networks is nevertheless between its short stages, or we consider such a healthy sign to that amount at
that place is already lots action in conformity with stand performed in accordance with boost latter
revolutionary safety options and applications because it networks. We performed a stark comment about
safety-oriented research among software-defined networks. We bear classified the present day labor
within couple foremost streams: Threat detection, cure, and fitness so simplify yet enhance the protection
of programmable networks yet security service, supplying current innovative security performance to
users, certain as like identity then community management. In computing, we think about dynamic
challenges yet future protection developments among SDN: This consists of the necessary issue of
securing SDN itself, out of regulating security policies across heterogeneous networks, customizing
overlay networks to furnish tightly closed environments, expanding the originate glide mannequin
together with hardware then community customization and virtualization applications Richer than the
services among the redirection path.

References

H. Farhady, H. Lee, and A. Nakao, “Software-Defined Networking: A survey,” Computer

Networks. 2015.

D. Kreutz, F. M. V. Ramos, and P. Verissimo, “Towards secure and dependable software-defined

networks,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software

defined networking - HotSDN ’13, 2013.

M. Jammal, T. Singh, A. Shami, R. Asal, and Y. Li, “Software defined networking: State of the art

and research challenges,” Computer Networks. 2014.

Z. Yao and Z. Yan, “Security in software-defined-networking: A survey,” in Lecture Notes in

Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes

in Bioinformatics), 2016.

M. Kobayashi et al., “Maturing of OpenFlow and Software-defined Networking through

deployments,” Comput. Networks, 2014.

I. F. Akyildiz, A. Lee, P. Wang, M. Luo, and W. Chou, “A roadmap for traffic engineering in

software defined networks,” Comput. Networks, 2014.

A. Akhunzada et al., “Secure and dependable software defined networks,” Journal of Network and

Computer Applications. 2016.

C. Douligeris and A. Mitrokotsa, “DDoS attacks and defense mechanisms: Classification and stateof-

the-art,” Comput. Networks, 2004.

S. Misra, P. Venkata Krishna, H. Agarwal, A. Saxena, and M. S. Obaidat, “A learning automata

based solution for preventing distributed denial of service in internet of things,” in Proceedings -

IEEE International Conferences on Internet of Things and Cyber, Physical and Social

Computing, iThings/CPSCom 2011, 2011.

A. Bonguet and M. Bellaiche, “A survey of Denial-of-Service and distributed Denial of Service

attacks and defenses in cloud computing,” Futur. Internet, 2017.

H. Beitollahi and G. Deconinck, “Analyzing well-known countermeasures against distributed

denial of service attacks,” Computer Communications. 2012.

UK National Computer Emergency Response Team, “Denial of service attacks : what you need to

know,” A CERT-UK Publ., 2014.

U. Tariq, Y. Malik, and B. Abdulrazak, “Defense and monitoring model for distributed denial of

service attacks,” in Procedia Computer Science, 2012.

G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, “DDoS attacks in cloud computing:

Issues, taxonomy, and future directions,” Computer Communications. 2017.

M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, “SPHINX: Detecting Security Attacks in

Software-Defined Networks,” 2015.

H. Cui, G. O. Karame, F. Klaedtke, and R. Bifulco, “On the Fingerprinting of Software-Defined

Networks,” IEEE Trans. Inf. Forensics Secur., 2016.

E. G. Renart, E. Z. Zhang, and B. Nath, “Towards a GPU SDN controller,” in Proceedings -

International Conference on Networked Systems, NetSys 2015, 2015.

Y. hwan Kim, H. kyo Lim, K. han Kim, and Y. H. Han, “A SDN-based distributed mobility

management in LTE/EPC network,” J. Supercomput., 2017.

J. M. Sanner, M. Ouzzif, and Y. Hadjadj-Aoul, “DICES: A dynamic adaptive service-driven SDN

architecture,” in 1st IEEE Conference on Network Softwarization: Software-Defined

Infrastructures for Networks, Clouds, IoT and Services, NETSOFT 2015, 2015.

A. Sanhaji, P. Niger, P. Cadro, C. Ollivier, and A. L. Beylot, “Congestion-based API for cloud and

WAN resource optimization,” in IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and

Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services, 2016.

Downloads

Published

2020-12-03

Issue

Section

Articles