Software Defined Networking: Identification of Pathways for Security Threats

被引:1
作者
Samson, A. [1 ]
Gopalan, N. P. [2 ]
机构
[1] Natl Inst Technol, Dept CSE, Trichy 15, Tamil Nadu, India
[2] Natl Inst Technol, Dept Comp Applicat, Trichy 15, Tamil Nadu, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16) | 2016年
关键词
SDN; Control Plane Interface; Data-Control plane interface; Open Support System; Application-Control Plane Interface; Distributed Denial of Service; Open Flow; Secure Socket Layer; Transport Layer Security; Role-Based Access Control; Out-of-Band;
D O I
10.1145/2980258.2980294
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As Industries and Data Center plan to implement Software Defined Networking (SDN), the main concern is the anxiety about security. The Industries and Data Centers are curious to know how a SDN product will support them that their data, supporting applications and built in infrastructure are not vulnerable to threats. The initiation of SDN, will demand new pathways for securing control plane traffic. The traditional networks usually trust switching intelligence to implement various defense mechanisms besides known attacks. Many attacks which distress traditional networks also affect SDNs, partially due to SDN architecture complexities and most prominent among them is DoS. This paper identifies the pathways of threats to SDN systems and discuss methods to ways to mitigate them.
引用
收藏
页数:6
相关论文
共 19 条
[1]  
[Anonymous], 2013, SDN SECURITY CONSIDE
[2]  
Benton K., 2013, P 2 ACM SIGCOMM WORK, P151, DOI [DOI 10.1145/2491185.2491222, 10.1145/2491185.2491222]
[3]  
Betts M, 2014, SDN ARCH
[4]  
Cabaj K., 2014, PROC ANN COMPUT SCI, P143
[5]  
Caesar M, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 2ND SYMPOSIUM ON NETWORKED SYSTEMS DESIGN & IMPLEMENTATION (NSDI '05), P15
[6]   Ethane: Taking control of the enterprise [J].
Casado, Martin ;
Freedman, Michael J. ;
Pettit, Justin ;
Luo, Jianying ;
McKeown, Nick ;
Shenker, Scott .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) :1-12
[7]  
Diego Kreutz, P 2 ACM SIGCOMM WORK, P55
[8]   Analysis of operating system diversity for intrusion tolerance [J].
Garcia, Miguel ;
Bessani, Alysson ;
Gashi, Ilir ;
Neves, Nuno ;
Obelheiro, Rafael .
SOFTWARE-PRACTICE & EXPERIENCE, 2014, 44 (06) :735-770
[9]  
Garg Gagandeep, 2014, INT J INNOVATIVE RES, V2
[10]  
Georgiev M., 2012, ACM CCS 12