SECURITY OF PLANES AND LOCAL NETWORKS WITH SDN ARCHITECTURE
Keywords:
software-defined networks, SDN, security, planesAbstract
The article describes vulnerabilities of SDN-based networks, including local networks and different effective ways to prevent danger to their security and configuration settings. The best practices and methods already tested but not massively implemented are proposed to enable for SDN networks. The applicability of mentioned methods for local networks are analyzed.
References
Cabaj, K., Wytrębowicz, J., Kuklinski, S., Radziszewski, P., Dinh, K. (2014). SDN Architecture Impact on Network Security. In Proceedings of the Federated Conference on Computer Science and Information Systems, Warsaw, Poland, Volume 3 (pp. 143–148).
Kulakov, Y., Kohan A., Kopychko S. (2019). Traffic Orchestration in Data Center Network Based on Software-Defined Networking Technology. In Proceedings of the 2nd International Conference on Computer Science, Engineering and Education Applications (ICCSEEA2019) (pp. 228-237).
Akbaş, M., Karaarslan E., Güngör C. (2016). A Preliminary Survey on the Security of Software-Defined Networks. In Proceedings of International Conference on Advanced Technology & Sciences (ICAT’16), Konya, Turkey (pp. 468-473).
Guo, Z., Liub, R., Xuc, Y., Gushchind A., Walide, A., Chao, J. STAR: Preventing flow-table overflow in software-defined networks. Computer Networks, 2016, vol. 125, pp. 15-25.
Tseng, Y., Pattaranantakul, M., He, R., Zhang, Z., Naït-Abdesselam, F. Controller DAC: Securing SDN controller with dynamic access control (2017). In Proceedings of IEEE International Conference on Communications (ICC), Paris (pp. 1-6).
Hogg, S. (2014). SDN Security Attack Vectors and SDN Hardening. [Online] Retrieved from: https://www.networkworld.com/article/2840273/sdn-security-attack-vectors-and-sdn-hardening.html.
Agrawal, R., Imielinski, T., Swami, A. (1993). Mining Association Rules Between Sets of Items in Large Databases. In Proceedings of ACM SIGMOD Int. Conf. Management of Data. [Online] Retrieved from: https://dl.acm.org/doi/10.1145/170036.170072.