2017
DOI: 10.1155/2017/8740217
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative Analysis of the Security of Software‐Defined Network Controller Using Threat/Effort Model

Abstract: SDN-based controller, which is responsible for the configuration and management of the network, is the core of Software-Defined Networks. Current methods, which focus on the secure mechanism, use qualitative analysis to estimate the security of controllers, leading to inaccurate results frequently. In this paper, we employ a quantitative approach to overcome the above shortage. Under the analysis of the controller threat model we give the formal model results of the APIs, the protocol interfaces, and the data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Such approaches may be based on the use of the list of attacks [15][16][17][18][19] or the list of attack scenarios [20]. Some approaches come down to analyzing the exploitation of vulnerabilities in the system [21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…Such approaches may be based on the use of the list of attacks [15][16][17][18][19] or the list of attack scenarios [20]. Some approaches come down to analyzing the exploitation of vulnerabilities in the system [21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…As the basis of the threat model, the authors most often use the list of attacks [11][12][13][14][15], the list of attack scenarios [16], the description of exploitation of vulnerabilities [17,18], and the description of attackers [19]. This approach does not allow to determine the list of threats.…”
Section: Introductionmentioning
confidence: 99%
“…Reference compares and evaluates the 2 controllers, OpenDaylight and ONOS, in particular their northbound interfaces (NBIs), based on the use cases such as discovering the network, adding a new network function, and changing an existing function. Reference employs a quantitative approach to analyze the security of the SDN controllers using threat/effort model. Reference is a framework to exploit the security of SDN, specifically the control plane.…”
Section: Introductionmentioning
confidence: 99%