SDN-based cyber defense: A survey

被引:50
作者
Yurekten, Ozgur [1 ,2 ]
Demirci, Mehmet [1 ]
机构
[1] Gazi Univ, Dept Comp Engn, Ankara, Turkey
[2] TUBITAK BILGEM, Cyber Secur Inst, Ankara, Turkey
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 115卷
关键词
Cyber threats; CTI; Network security; Cyber defense; Software defined networking; SDN; SOFTWARE-DEFINED NETWORKING; MOVING TARGET DEFENSE; THREAT INTELLIGENCE; DDOS DEFENSE; SECURITY; MECHANISM; TAXONOMY; ARCHITECTURE; ATTACKS; RECONNAISSANCE;
D O I
10.1016/j.future.2020.09.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growth and ubiquity of the Internet have changed the world in numerous ways, one of which is giving rise to the necessity of being vigilant about information security and cyber threats. As threat actors have become more sophisticated and new threats are emerging constantly, meeting information security objectives requires taking advantage of the latest technologies and tools. This paper focuses on a popular technology that can improve the way security is achieved: software-defined networking (SDN). Thanks to its flexibility, cost efficiency, and suitability for incremental deployment, SDN provides a practical means of developing effective security solutions. Through an extensive survey of the literature, we develop a taxonomy for SDN-based solutions to common attack types, identify the security primitives utilized in these studies, and categorize proposals by cyber threat category. Furthermore, we present a quantitative evaluation of the reviewed studies according to threat category, defense type, strategy, techniques, and deployment details. Finally, we discuss various challenges and potential research questions to be investigated in this area. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:126 / 149
页数:24
相关论文
共 138 条
[1]   Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies [J].
Achleitner, Stefan ;
La Porta, Thomas F. ;
McDaniel, Patrick ;
Sugrim, Shridatt ;
Krishnamurthy, Srikanth V. ;
Chadha, Ritu .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2017, 14 (04) :1098-1112
[2]   Cyber Deception: Virtual Networks to Defend Insider Reconnaissance [J].
Achleitner, Stefan ;
La Porta, Thomas ;
McDaniel, Patrick ;
Sugrim, Shridatt ;
Krishnamurthy, Srikanth V. ;
Chadha, Ritu .
MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, :57-68
[3]  
Achleitner Stefan., 2017, P S SDN RES, P8, DOI DOI 10.1145/3050220.3050223
[4]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[5]   Securing ARP in Software Defined Networks [J].
Alharbi, Talal ;
Durando, Dario ;
Pakzad, Farzaneh ;
Portmann, Marius .
2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, :523-526
[6]   Applications of Blockchains in the Internet of Things: A Comprehensive Survey [J].
Ali, Muhammad Salek ;
Vecchio, Massimo ;
Pincheira, Miguel ;
Dolui, Koustabh ;
Antonelli, Fabio ;
Rehmani, Mubashir Husain .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1676-1717
[7]   Security of Software Defined Networks: A survey [J].
Alsmadr, Izzat ;
Xu, Dianxiang .
COMPUTERS & SECURITY, 2015, 53 :79-108
[8]  
Amer S.H., 2010, DEFENSIVE CYBER SECU, V13, P22
[9]  
[Anonymous], 2015, GLOB INFORM INFRAS
[10]  
[Anonymous], 2017, INT SEC THREAT REP