2019
DOI: 10.23919/jcc.2019.07.002
|View full text |Cite
|
Sign up to set email alerts
|

A survey: Typical security issues of software-defined networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(22 citation statements)
references
References 0 publications
0
13
0
3
Order By: Relevance
“…In software-defined networking, security is a very critical feature [71]. In order to provide usability, integrity, and protection to all elements and info, SDN protection needs to be integrated into the architecture [72].…”
Section: Security Challengesmentioning
confidence: 99%
“…In software-defined networking, security is a very critical feature [71]. In order to provide usability, integrity, and protection to all elements and info, SDN protection needs to be integrated into the architecture [72].…”
Section: Security Challengesmentioning
confidence: 99%
“…As the decision center, the controller has a high probability to become the target of attackers. D. Melkov et al [18] analyzed the advantages and disadvantages of SDN in detail and classify security threats into SDN's unique challenges and the same challenges as classical networks. The security vulnerability of controller is studied and discussed from different angles, because it is the most vulnerable component in SDN architecture.…”
Section: • Lack Of Authentication Mechanism and Application Authoriza...mentioning
confidence: 99%
“…Despite there are a lot of literatures researching the security problems occurred in IIoT toward many aspects such as threats detection and mitigation, secure policy enforcement, and secure routing, 12‐34 these researches are far from enough to guarantee the access control, authentication and data integrity, especially under such centralized and virtualized IIoT environment, because the controller is like a third‐party trust center where all the authentication and authorization behaviors are fulfilled. Once some “trusted” devices or entities defraud the control access, they can proceed malicious activities (eg, tampering) and remove their tracks subsequently.…”
Section: Introductionmentioning
confidence: 99%