SDN-based cyber defense: A survey

被引:50
作者
Yurekten, Ozgur [1 ,2 ]
Demirci, Mehmet [1 ]
机构
[1] Gazi Univ, Dept Comp Engn, Ankara, Turkey
[2] TUBITAK BILGEM, Cyber Secur Inst, Ankara, Turkey
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 115卷
关键词
Cyber threats; CTI; Network security; Cyber defense; Software defined networking; SDN; SOFTWARE-DEFINED NETWORKING; MOVING TARGET DEFENSE; THREAT INTELLIGENCE; DDOS DEFENSE; SECURITY; MECHANISM; TAXONOMY; ARCHITECTURE; ATTACKS; RECONNAISSANCE;
D O I
10.1016/j.future.2020.09.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growth and ubiquity of the Internet have changed the world in numerous ways, one of which is giving rise to the necessity of being vigilant about information security and cyber threats. As threat actors have become more sophisticated and new threats are emerging constantly, meeting information security objectives requires taking advantage of the latest technologies and tools. This paper focuses on a popular technology that can improve the way security is achieved: software-defined networking (SDN). Thanks to its flexibility, cost efficiency, and suitability for incremental deployment, SDN provides a practical means of developing effective security solutions. Through an extensive survey of the literature, we develop a taxonomy for SDN-based solutions to common attack types, identify the security primitives utilized in these studies, and categorize proposals by cyber threat category. Furthermore, we present a quantitative evaluation of the reviewed studies according to threat category, defense type, strategy, techniques, and deployment details. Finally, we discuss various challenges and potential research questions to be investigated in this area. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:126 / 149
页数:24
相关论文
共 138 条
[91]   Reactive security for SDN/NFV-enabled industrial networks leveraging service function chaining [J].
Petroulakis, Nikolaos E. ;
Fysarakis, Konstantinos ;
Askoxylakis, Ioannis ;
Spanoudakis, George .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (07)
[92]  
Piedrahita A.F.M., 2015, GLOB INFORM INFRAS, P1, DOI 10.1109/GIIS.2015.7347185
[93]   Blockchain-based security aspects in heterogeneous Internet-of-Things networks: A survey [J].
Pohrmen, Fabiola Hazel ;
Das, Rohit Kumar ;
Saha, Goutam .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10)
[94]   Blockchain for 5G: A Prelude to Future Telecommunication [J].
Praveen, Gorla ;
Chamola, Vinay ;
Hassija, Vikas ;
Kumar, Neeraj .
IEEE NETWORK, 2020, 34 (06) :106-113
[95]   Data-driven analytics for cyber-threat intelligence and information sharing [J].
Qamar, Sara ;
Anwar, Zahid ;
Rahman, Mohammad Ashiqur ;
Al-Shaer, Ehab ;
Chu, Bei-Tseng .
COMPUTERS & SECURITY, 2017, 67 :35-58
[96]   Software Defined Networking Architecture, Security and Energy Efficiency: A Survey [J].
Rawat, Danda B. ;
Reddy, Swetha R. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01) :325-346
[97]  
Rhoades D, 2014, INT CARN CONF SECU
[98]   CINDAM: Customized Information Networks for Deception and Attack Mitigation [J].
Robertson, Seth ;
Alexander, Scott ;
Micallef, Josephine ;
Pucci, Jonathan ;
Tanis, James ;
Macera, Anthony .
2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, :114-119
[99]   A Visual Analytics Approach for Word Relevances in Multiple Texts [J].
Rodrigues, Nils ;
Burch, Michael ;
Di Silvestro, Lorenzo ;
Weiskopf, Daniel .
2017 21ST INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV), 2017, :1-7
[100]  
Sahri N, 2016, CFI 16, P83