A review of solutions for SDN-Exclusive security issues
Journal article
Authors | Spooner, Jakob and Zhu, Shao Ying |
---|---|
Abstract | Software Defined Networking is a paradigm still in its emergent stages in the realm of production-scale networks. Centralisation of network control introduces a new level of flexibility for network administrators and programmers. Security is a huge factor contributing to consumer resistance to implementation of SDN architecture. Without addressing the issues inherent from SDNs centralised nature, the benefits in performance and network configurative flexibility cannot be harnessed. This paper explores key threats posed to SDN environments and comparatively analyses some of the mechanisms proposed as mitigations against these threats – it also provides some insight into the future works which would enable a securer SDN architecture. - |
Keywords | Software defined networking (SDN); Security; Software; Networking; OpenFlow; Network security |
Year | 2016 |
Journal | International Journal of Advanced Computer Science and Applications (IJACSA) |
Publisher | Science and Information (SAI) Organization Ltd. |
ISSN | 2158-107X |
2156-5570 | |
Digital Object Identifier (DOI) | https://doi.org/10.14569/IJACSA.2016.070817 |
Web address (URL) | http://hdl.handle.net/10545/620913 |
hdl:10545/620913 | |
Publication dates | 2016 |
Publication process dates | |
Deposited | 21 Nov 2016, 10:56 |
Contributors | University of Derby |
File | File Access Level Open |
File | File Access Level Open |
File | File Access Level Open |
https://repository.derby.ac.uk/item/9505v/a-review-of-solutions-for-sdn-exclusive-security-issues
Download files
60
total views37
total downloads3
views this month0
downloads this month
Export as
Related outputs

A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments.
Kazim, M., Liu, Lu, Zhu, Shao Ying and Zheng, Yongjun 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments
Liu, Lu, Zhu, Shao Ying and Kazim, M. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
Guide to security assurance for cloud computing
Zhu, Shao Ying, Hill, Richard and Trovati, Marcello 2015. Guide to security assurance for cloud computing. Springer.
Big-Data analytics and cloud computing: Theory, algorithms and applications
Hill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying 2015. Big-Data analytics and cloud computing: Theory, algorithms and applications. Springer.
Analysis of HEp-2 images using MD-LBP and MAD-bagging
Schaefer, Gerald, Doshi, Niraj P., Zhu, Shao Ying and Hu, Qinghua 2014. Analysis of HEp-2 images using MD-LBP and MAD-bagging. IEEE. https://doi.org/10.1109/EMBC.2014.6944562
A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network
Whitfield, Richard and Zhu, Shao Ying 2015. A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060123