A review of solutions for SDN-Exclusive security issues

Journal article


Spooner, Jakob and Zhu, Shao Ying 2016. A review of solutions for SDN-Exclusive security issues. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2016.070817
AuthorsSpooner, Jakob and Zhu, Shao Ying
Abstract

Software Defined Networking is a paradigm still in its emergent stages in the realm of production-scale networks. Centralisation of network control introduces a new level of flexibility for network administrators and programmers. Security is a huge factor contributing to consumer resistance to implementation of SDN architecture. Without addressing the issues inherent from SDNs centralised nature, the benefits in performance and network configurative flexibility cannot be harnessed. This paper explores key threats posed to SDN environments and comparatively analyses some of the mechanisms proposed as mitigations against these threats – it also provides some insight into the future works which would enable a securer SDN architecture. -

KeywordsSoftware defined networking (SDN); Security; Software; Networking; OpenFlow; Network security
Year2016
JournalInternational Journal of Advanced Computer Science and Applications (IJACSA)
PublisherScience and Information (SAI) Organization Ltd.
ISSN2158-107X
2156-5570
Digital Object Identifier (DOI)https://doi.org/10.14569/IJACSA.2016.070817
Web address (URL)http://hdl.handle.net/10545/620913
hdl:10545/620913
Publication dates2016
Publication process dates
Deposited21 Nov 2016, 10:56
ContributorsUniversity of Derby
File
File Access Level
Open
File
File Access Level
Open
File
File Access Level
Open
Permalink -

https://repository.derby.ac.uk/item/9505v/a-review-of-solutions-for-sdn-exclusive-security-issues

Download files

  • 50
    total views
  • 32
    total downloads
  • 2
    views this month
  • 1
    downloads this month

Export as

Related outputs

A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments.
Kazim, M., Liu, Lu, Zhu, Shao Ying and Zheng, Yongjun 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments
Liu, Lu, Zhu, Shao Ying and Kazim, M. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
Guide to security assurance for cloud computing
Zhu, Shao Ying, Hill, Richard and Trovati, Marcello 2015. Guide to security assurance for cloud computing. Springer.
Big-Data analytics and cloud computing: Theory, algorithms and applications
Hill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying 2015. Big-Data analytics and cloud computing: Theory, algorithms and applications. Springer.
Analysis of HEp-2 images using MD-LBP and MAD-bagging
Schaefer, Gerald, Doshi, Niraj P., Zhu, Shao Ying and Hu, Qinghua 2014. Analysis of HEp-2 images using MD-LBP and MAD-bagging. IEEE. https://doi.org/10.1109/EMBC.2014.6944562
A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network
Whitfield, Richard and Zhu, Shao Ying 2015. A comparison of OSPFv3 and EIGRPv6 in a small IPv6 enterprise network. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060123
A survey on top security threats in cloud computing
Kazim, M. and Zhu, Shao Ying 2015. A survey on top security threats in cloud computing. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060316#sthash.hDOJaK6L.dpuf