2021
DOI: 10.1016/j.future.2020.09.006
|View full text |Cite
|
Sign up to set email alerts
|

SDN-based cyber defense: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(23 citation statements)
references
References 56 publications
0
19
0
Order By: Relevance
“…IoT environments generate a massive amount of data traffic that could overwhelm the system, traditional security systems are unsuitable in dealing with security threats to the system, which led to the suggestion of deploying SDN to provide specialized security enhancement to meet the increased requirement of the environment. 29,[105][106][107] Components such as policy controller and execution appliance are deployed within the network to prevent violation and exploitation based on the dynamic management afforded by these components. 108 The application layer, control plane, and data plane are the three layers that make up the SDN architecture.…”
Section: Software-defined Networkmentioning
confidence: 99%
“…IoT environments generate a massive amount of data traffic that could overwhelm the system, traditional security systems are unsuitable in dealing with security threats to the system, which led to the suggestion of deploying SDN to provide specialized security enhancement to meet the increased requirement of the environment. 29,[105][106][107] Components such as policy controller and execution appliance are deployed within the network to prevent violation and exploitation based on the dynamic management afforded by these components. 108 The application layer, control plane, and data plane are the three layers that make up the SDN architecture.…”
Section: Software-defined Networkmentioning
confidence: 99%
“…Large-scale DDoS attacks involve threats from multiple categories, usually requiring multi-pronged defense mechanisms combining several defense approaches [29]. The efficiency of DDoS attacks depends on different aspects, one of the most important is the size of the botnet used to launch an attack [26].…”
Section: Related Workmentioning
confidence: 99%
“…[17] Cryptography is a phenomenon that makes use of public, private, or shared keys for the encryption of the information at the sender's end, which is then transferred in the same form and is decrypted with the help of the key at the end of the receiver. [18] Various encryption algorithms have been developed and may be used in the case of SDN security as well. One such algorithm is the Rivest, Shamir, and Adleman (RSA) encryption algorithm.…”
Section: Defense In-depthmentioning
confidence: 99%