SECURITY OF PLANES AND LOCAL NETWORKS WITH SDN ARCHITECTURE

Authors

  • Oleksii Cherevatenko National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Ukraine
  • Yurii Kulakov Національний технічний університет України «Київський політехнічний інститут імені Ігоря Сікорського», Ukraine

Keywords:

software-defined networks, SDN, security, planes

Abstract

The article describes vulnerabilities of SDN-based networks, including local networks and different effective ways to prevent danger to their security and configuration settings. The best practices and methods already tested but not massively implemented are proposed to enable for SDN networks. The applicability of mentioned methods for local networks are analyzed.

References

Cabaj, K., Wytrębowicz, J., Kuklinski, S., Radziszewski, P., Dinh, K. (2014). SDN Architecture Impact on Network Security. In Proceedings of the Federated Conference on Computer Science and Information Systems, Warsaw, Poland, Volume 3 (pp. 143–148).

Kulakov, Y., Kohan A., Kopychko S. (2019). Traffic Orchestration in Data Center Network Based on Software-Defined Networking Technology. In Proceedings of the 2nd International Conference on Computer Science, Engineering and Education Applications (ICCSEEA2019) (pp. 228-237).

Akbaş, M., Karaarslan E., Güngör C. (2016). A Preliminary Survey on the Security of Software-Defined Networks. In Proceedings of International Conference on Advanced Technology & Sciences (ICAT’16), Konya, Turkey (pp. 468-473).

Guo, Z., Liub, R., Xuc, Y., Gushchind A., Walide, A., Chao, J. STAR: Preventing flow-table overflow in software-defined networks. Computer Networks, 2016, vol. 125, pp. 15-25.

Tseng, Y., Pattaranantakul, M., He, R., Zhang, Z., Naït-Abdesselam, F. Controller DAC: Securing SDN controller with dynamic access control (2017). In Proceedings of IEEE International Conference on Communications (ICC), Paris (pp. 1-6).

Hogg, S. (2014). SDN Security Attack Vectors and SDN Hardening. [Online] Retrieved from: https://www.networkworld.com/article/2840273/sdn-security-attack-vectors-and-sdn-hardening.html.

Agrawal, R., Imielinski, T., Swami, A. (1993). Mining Association Rules Between Sets of Items in Large Databases. In Proceedings of ACM SIGMOD Int. Conf. Management of Data. [Online] Retrieved from: https://dl.acm.org/doi/10.1145/170036.170072.

Downloads

Published

2023-06-08

Issue

Section

Global Networks, Grid and Cloud