2016
DOI: 10.1002/sec.1759
|View full text |Cite
|
Sign up to set email alerts
|

Research Trends in Security and DDoS in SDN

Abstract: Software‐Defined Networks (SDNs) are emerging as one of the most promising new era network technologies with its centralized and easily programmable nature. Many security issues with legacy networks could easily be resolved using SDNs central management and control; at the same time, security vulnerabilities of this technology are still the biggest concern of researchers and industries for adapting this technology. In this paper, a comprehensive review on security aspects of SDN is presented, considering how r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 84 publications
(29 citation statements)
references
References 60 publications
0
22
0
2
Order By: Relevance
“…Mostly DDoS attack will affect the controller by using the flooding attack, one of the type of DDoS.But there is a possibilities of intrusion of DDoS attack in the data plane. Neelam et al [16] discussed about various DDoS attack issue that occurs in SDN. SDN faces the challenges against attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Mostly DDoS attack will affect the controller by using the flooding attack, one of the type of DDoS.But there is a possibilities of intrusion of DDoS attack in the data plane. Neelam et al [16] discussed about various DDoS attack issue that occurs in SDN. SDN faces the challenges against attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Other important challenges in SDN are policy-based detection [18] and security policy enforcement. Indeed, multiple OpenFlow custom applications running concurrently in the application layer may insert different control policies dynamically.…”
Section: Firewalls On Sdnmentioning
confidence: 99%
“…Benton et al also present a brief overview of the vulnerabilities in OpenFlow protocol [15]. In addition, there are some works [34][35][36][37][38] that analyze vulnerabilities that exist in SDN network and present relevant studies dealing with vulnerabilities. Finally, Yoon et al systemize the attack surfaces existing in SDN network and evaluate them against three popular SDN controllers [39].…”
Section: Related Workmentioning
confidence: 99%