The Application of Software-Defined Networking On Secure Computer Networks
DOI:
https://doi.org/10.32792/jeps.v10i1.49Keywords:
Software define network, Open Flows Dos, Defenders SecurityAbstract
In this paper, we analyze the dos risk within the Software-Defined Networking structure to look atextenuation strategies. SDN assaults are observed remember normally about the impersonation of the
source MAC address, IP Address, and port. In addition, mitigation strategies center of attention on
buffering or scheduling policies. It can't stop assaults out of coming into the community then necessity
additional hardware. To give up rejection concerning work assaults concentrated on SDN beyond the
source, we propose dos defender. We appeal such between the detector power one or consider the dos
protagonist effectiveness. The empirical results show so much dos advocate do shield towards denial on
employment attacks that target SDN effectively. Although modern-day extenuation techniques between
dos cannot guard the OFA, proof trough assets then limit simultaneously, our designs are able
efficaciously barrier traffic beyond network access or soothe dos attacks. Research on software-savvy
networks is nevertheless between its short stages, or we consider such a healthy sign to that amount at
that place is already lots action in conformity with stand performed in accordance with boost latter
revolutionary safety options and applications because it networks. We performed a stark comment about
safety-oriented research among software-defined networks. We bear classified the present day labor
within couple foremost streams: Threat detection, cure, and fitness so simplify yet enhance the protection
of programmable networks yet security service, supplying current innovative security performance to
users, certain as like identity then community management. In computing, we think about dynamic
challenges yet future protection developments among SDN: This consists of the necessary issue of
securing SDN itself, out of regulating security policies across heterogeneous networks, customizing
overlay networks to furnish tightly closed environments, expanding the originate glide mannequin
together with hardware then community customization and virtualization applications Richer than the
services among the redirection path.
References
H. Farhady, H. Lee, and A. Nakao, “Software-Defined Networking: A survey,” Computer
Networks. 2015.
D. Kreutz, F. M. V. Ramos, and P. Verissimo, “Towards secure and dependable software-defined
networks,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software
defined networking - HotSDN ’13, 2013.
M. Jammal, T. Singh, A. Shami, R. Asal, and Y. Li, “Software defined networking: State of the art
and research challenges,” Computer Networks. 2014.
Z. Yao and Z. Yan, “Security in software-defined-networking: A survey,” in Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes
in Bioinformatics), 2016.
M. Kobayashi et al., “Maturing of OpenFlow and Software-defined Networking through
deployments,” Comput. Networks, 2014.
I. F. Akyildiz, A. Lee, P. Wang, M. Luo, and W. Chou, “A roadmap for traffic engineering in
software defined networks,” Comput. Networks, 2014.
A. Akhunzada et al., “Secure and dependable software defined networks,” Journal of Network and
Computer Applications. 2016.
C. Douligeris and A. Mitrokotsa, “DDoS attacks and defense mechanisms: Classification and stateof-
the-art,” Comput. Networks, 2004.
S. Misra, P. Venkata Krishna, H. Agarwal, A. Saxena, and M. S. Obaidat, “A learning automata
based solution for preventing distributed denial of service in internet of things,” in Proceedings -
IEEE International Conferences on Internet of Things and Cyber, Physical and Social
Computing, iThings/CPSCom 2011, 2011.
A. Bonguet and M. Bellaiche, “A survey of Denial-of-Service and distributed Denial of Service
attacks and defenses in cloud computing,” Futur. Internet, 2017.
H. Beitollahi and G. Deconinck, “Analyzing well-known countermeasures against distributed
denial of service attacks,” Computer Communications. 2012.
UK National Computer Emergency Response Team, “Denial of service attacks : what you need to
know,” A CERT-UK Publ., 2014.
U. Tariq, Y. Malik, and B. Abdulrazak, “Defense and monitoring model for distributed denial of
service attacks,” in Procedia Computer Science, 2012.
G. Somani, M. S. Gaur, D. Sanghi, M. Conti, and R. Buyya, “DDoS attacks in cloud computing:
Issues, taxonomy, and future directions,” Computer Communications. 2017.
M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, “SPHINX: Detecting Security Attacks in
Software-Defined Networks,” 2015.
H. Cui, G. O. Karame, F. Klaedtke, and R. Bifulco, “On the Fingerprinting of Software-Defined
Networks,” IEEE Trans. Inf. Forensics Secur., 2016.
E. G. Renart, E. Z. Zhang, and B. Nath, “Towards a GPU SDN controller,” in Proceedings -
International Conference on Networked Systems, NetSys 2015, 2015.
Y. hwan Kim, H. kyo Lim, K. han Kim, and Y. H. Han, “A SDN-based distributed mobility
management in LTE/EPC network,” J. Supercomput., 2017.
J. M. Sanner, M. Ouzzif, and Y. Hadjadj-Aoul, “DICES: A dynamic adaptive service-driven SDN
architecture,” in 1st IEEE Conference on Network Softwarization: Software-Defined
Infrastructures for Networks, Clouds, IoT and Services, NETSOFT 2015, 2015.
A. Sanhaji, P. Niger, P. Cadro, C. Ollivier, and A. L. Beylot, “Congestion-based API for cloud and
WAN resource optimization,” in IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and
Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services, 2016.
Downloads
Published
Issue
Section
License
The Authors understand that, the copyright of the articles shall be assigned to Journal of education for Pure Science (JEPS), University of Thi-Qar as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , will be allowed only with a written permission from Journal of education for Pure Science (JEPS), University of Thi-Qar.
Journal of education for Pure Science (JEPS), University of Thi-Qar, the Editors and the Advisory International Editorial Board make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the Journal of education for Pure Science (JEPS), University of Thi-Qar are sole and exclusive responsibility of their respective authors and advertisers.