On the Security of SDN: A Completed Secure and Scalable Framework Using the Software-Defined Perimeter

被引:45
作者
Sallam, Ahmed [1 ,3 ]
Refaey, Ahmed [1 ,2 ]
Shami, Abdallah [1 ]
机构
[1] Western Univ, Dept Elect & Comp Engn, London, ON N6A 3K7, Canada
[2] Manhattan Coll, New York, NY 10471 USA
[3] Suez Canal Univ, Dept Comp Sci, Ismailia 41522, Egypt
关键词
SDP; SDN; DoS attack; security; network virtualization; NETWORKS;
D O I
10.1109/ACCESS.2019.2939780
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption and evolution of Software Defined Networking (SDN) have enabled the service providers to successfully simplify network management. Along with the traffic explosion, there is decreasing CAPEX and OPEX as well as an increase in the average revenue per user. However, this wide adoption of SDNs is posing real challenges and concerns in terms of security aspects. The main challenges are how to provide proper authentication, access control, data privacy, and data integrity among others for the API-driven orchestration of network routing. Herein, the Software Defined Perimeter (SDP) is proposed as a framework to provide an orchestration of connections. The expectation is a framework that restricts network access and connections between objects on the SDN-enabled network infrastructures. There are several potential benefits as a result of the integration between SDP systems and SDNs. In particular, it provides a completely scalable and managed security solution. Consequently, it leads to flexible deployment that can be tailored to fit the need of any generic network security perimeter. The proposed Integrated frameworks are examined through virtualized network testbeds. The testing results demonstrate that the proposed framework is malleable to both port scanning (PS) attack and Denial of Service (DoS) bandwidth attack. In addition, it clarifies some interesting potential integration points between the SDP systems and SDNs to further research in this area.
引用
收藏
页码:146577 / 146587
页数:11
相关论文
共 30 条
[1]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[2]   Optimized Provisioning of SDN-enabled Virtual Networks in Geo-distributed Cloud Computing Datacenters [J].
Alhazmi, Khaled ;
Shami, Abdallah ;
Refaey, Ahmed .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2017, 19 (04) :402-415
[3]  
Ali A. F. T., 2017, GUIDE SECURITY SDN N
[4]  
[Anonymous], 2013, SDN SECURITY CONSIDE
[5]  
[Anonymous], 2018, OMNISECU
[6]  
Bernat V., 2018, TLS COMPUTATIONAL MI
[7]   Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate [J].
Bhargavan, Karthikeyan ;
Blanchet, Bruno ;
Kobeissi, Nadim .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :483-502
[8]  
Casado M., 2018, LIST OPENFLOW SOFTWA
[9]  
Cisco, 2018, WHIT PAP CISC VIS NE
[10]  
Cole E., 2018, SECURITY LAB HONEYPO