Effectiveness of Security in Software Defined Networks
Keywords:
SDN, ONF, Network securityAbstract
Software Defined Networks are the new standard in networking. ONF [Open Networking Foundation] contributes a high level architecture for SDN. It has three layers, they are Infrastructure layer, control layer and application layer.[1] From the ONF we gets a well-defined definition for SDN which is as follows, “In the SDN architecture, the control and data planes are decoupled, network intelligence and state are logically centralized, and the underlying network infrastructure is abstracted from the applications” [2]. The network security in the SDN architecture is improved by the centralized control over the network and controls the traffic in run time. This paper analyse and produce the importance and effectives of the SDN architecture for future networking.
References
[1] M. D. Yosr Jarraya, Taous Madi, “A survey and a layered taxonomy of software-defined networking,” IEEE Commun. Surveys & Tutorials, vol. 16, no. 4, pp. 1955–1980, Fourth Quarter 2014.
[2] S. Sezer, S. Scott-Hayward, P.-K. Chouhan, B. Fraser, D. Lake, J. Finnegan, N. Viljoen, M. Miller, and N. Rao, “Are we ready for SDN? implementation challenges for software-defined networks,” IEEE Commun. Mag., vol. 51, no. 7, July 2013.
[3] S. Namal, I. Ahmad, S. Saud, M. Jokinen, and A. Gurtov, “Implementation of OpenFlow based cognitive radio network architecture: SDNR,” Wireless Networks, pp. 1–15, 2015.
[4] M. D. Yosr Jarraya, Taous Madi, “A survey and a layered taxonomy of software-defined networking,” IEEE Commun. Surveys & Tutorials, vol. 16, no. 4, pp. 1955–1980, Fourth Quarter 2014.
[5] A. T. Campbell, I. Katzela, K. Miki, and J. Vicente. “Open signaling for ATM, internet and mobile networks (OPENSIG’98).” ACM SIGCOMM Computer Communication Review 29.1 (1999): 97–108.
[6] J. E. Van der Merwe, S. Rooney, I. Leslie, and S. Crosby. “The tempest‐a practical framework for network programmability.” IEEE Network 12.3 (1998): 20–28.
[7] N. Shalaby, Y. Gottlieb, M. Wawrzoniak, and L. Peterson. “Snow on silk: A nodeOS in the Linux kernel.” Active Networks. Springer, Berlin (2002): 1–19.
[8] NIST: National Vulnerability database, http://web.nvd. nist.gov/view/vuln/ detail ? vulnId=CVE-S2009-3733; 2011.
[9] D. Goodin, “Webhost Hack Wipes Out Data for 100,000 Sites ”,http:// www.theregister.co.uk/ 2009 /06/ 08/ webhost_attack, 2009
[10] C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan,“A Survey of Intrusion Detection Techniques in Cloud”, Journal of Network and Computer Applications 36 (2013), pp. 42-57.
[11] S. Shin and G. Gu, “Attacking software-defined networks: a first feasibility study,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013, pp. 165–166.
[12] X. Wen, Y. Chen, C. Hu, C. Shi, and Y. Wang, “Towards a secure controller platform for OpenFlow applications,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013, pp. 171–172.
[13] T. Tsou, H. Yin, H. Xie, and D. Lopez, “Use-Cases for ALTO with Software Defined Networks,” 2012.
[14] Advanced message queuing protocol. [Online]. Available: http://www.amqp.org
[15] Y. Hu, W. Wang, X. Gong, X. Que, and S. Cheng, “On reliabilityoptimized controller placement for software-defined networks,” Communications, China, vol. 11, no. 2, pp. 38–54, Feb 2014.
[16] security enforcement kernel for OpenFlow networks,” in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. HotSDN ’12. ACM, 2012, pp. 121–126.
[17] A. Khurshid, W. Zhou, M. Caesar, and P. B. Godfrey, “Veriflow: Verifying Network-wide Invariants in Real Time,” SIGCOMM Comput.Commun. Rev., vol. 42, no. 4, pp. 467–472, Sep. 2012.
[18] A. Tootoonchian and Y. Ganjali, “HyperFlow: A distributed control plane for OpenFlow,” in Proceedings of the 2010 internet network management conference on Research on enterprise networking. USENIX Association, 2010, pp. 3–3.
[19] S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “Avant-guard: Scalable and vigilant switch flow management in software-defined networks,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ser. CCS ’13. ACM, 2013, pp. 413–424.
[20] A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood, “On controller performance in software-defined networks,” in USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
