Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI, and MTD Approaches to Security Solutions

被引:10
|
作者
Abdi, Abdinasir Hirsi [1 ]
Audah, Lukman [1 ,2 ]
Salh, Adeb [3 ]
Alhartomi, Mohammed A. [4 ]
Rasheed, Haroon [5 ]
Ahmed, Salman [6 ]
Tahir, Ahmed [7 ]
机构
[1] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, Adv Telecommun Res Ctr ATRC, Parit Raja 86400, Malaysia
[2] Univ Tun Hussein Onn Malaysia, Fac Engn Technol, Parit Raja 86400, Malaysia
[3] Univ Tunku Abdul Rahman UTAR, Fac Informat & Commun Technol, Kampar 31900, Malaysia
[4] Univ Tabuk, Dept Elect Engn, Tabuk 71491, Saudi Arabia
[5] Bahria Univ Karachi Campus, Dept Elect Engn, Karachi 75300, Pakistan
[6] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, VLSI & Embedded Technol VEST Focus Grp, Parit Raja 86400, Malaysia
[7] Somtel Telecommun Co, Engn Dept, Bosaso 25290, Bari, Somalia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; Artificial intelligence; Surveys; Reviews; Protocols; Programming; IP networks; Computer security; Software defined networking; AI; control plane; cybersecurity; data plane; moving target defense; SDN security; southbound interface; traditional SDN security; MOVING TARGET DEFENSE; SOFTWARE-DEFINED NETWORKS; AUTHENTICATION; ISSUES; CLASSIFICATION; VERIFICATION; CHALLENGES; MITIGATION; ATTACKS; SERVICE;
D O I
10.1109/ACCESS.2024.3393548
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed network management significantly. By integrating data and control, SDN offers unparalleled flexibility and responsiveness, thereby overcoming the limitations of conventional network architectures. However, a centralized controller, which is a hallmark of SDN, is a double-edged security sword that offers easy control. This also becomes a dangerous point of failure for the entire network. To the best of our knowledge, this is the first comprehensive study to explore traditional-based, artificial intelligence (AI)-based, and moving target defense (MTD) approaches to securing SDN. The study begins with a survey of traditional security solutions for SDN, encompassing authentication, authorization, encryption, security protocols, firewalls, and flow verification, by addressing security threats and vulnerabilities in both data and control planes. The study then investigates the application of AI-based security solutions in an SDN environment, focusing on how Machine Learning (ML) and Deep Learning (DL) techniques are leveraged to address advanced security threats. Additionally, the survey examines MTD mechanisms within data and control plane security. Several in-depth techniques, including the randomization of Internet Protocol (IP) and Media Access Control (MAC) addresses, port numbers, and flow tables, and delving into the relationship between security threats, MTD strategies, and the specific controllers employed in experimental implementations. We utilized the widely recognized STRIDE cybersecurity framework to systematically identify and evaluate the potential threats to SDN security. Our analysis resulted in a comprehensive list of security challenges, and we propose future research directions aimed at addressing emerging threats in both the data and control planes.
引用
收藏
页码:69941 / 69980
页数:40
相关论文
共 34 条
  • [21] Securing the Future: A Comprehensive Review of Security Challenges and Solutions in Advanced Driver Assistance Systems
    Mehta, Aryan Alpesh
    Padaria, Ali Asgar
    Bavisi, Dwij Jayesh
    Ukani, Vijay
    Thakkar, Priyank
    Geddam, Rebekah
    Kotecha, Ketan
    Abraham, Ajith
    IEEE ACCESS, 2024, 12 : 643 - 678
  • [22] Blockchain and federated learning-based security solutions for telesurgery system: a comprehensive review
    Chaudjary, Sachi
    Kakkar, Riya
    Gupta, Rajesh
    Tanwar, Sudeep
    Agrawal, Smita
    Sharma, Ravi
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2022, 30 (07) : 2446 - 2488
  • [23] Advancing Security: Exploring AI-driven Data Encryption Solutions for Wireless Sensor Networks
    Arulmurugan, L.
    Thakur, Sangeeta
    Dayana, R.
    Thenappan, S.
    Nagesh, Banavath
    Sri, R. Kalaivani
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [24] A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement
    Alam, Md Morshed
    Wang, Weichao
    JOURNAL OF COMPUTER SECURITY, 2021, 29 (04) : 423 - 446
  • [25] A Comprehensive Review on Synthetic Insecticides: Toxicity to Pollinators, Associated Risk to Food Security, and Management Approaches
    Ara Z.G.
    Haque A.R.
    Journal of Biosystems Engineering, 2021, 46 (03) : 254 - 272
  • [26] Mobile health-empowered traditional ethnic sports: AI-based data analysis improving security
    Liu, Ning
    Jin, Yuzhu
    INTERNET TECHNOLOGY LETTERS, 2024, 7 (05)
  • [27] Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization
    He, Yunhua
    Zhou, Zhihao
    Pan, Yan
    Chong, Fahui
    Wu, Bin
    Xiao, Ke
    Li, Hong
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (03):
  • [28] TID-MOP: The Comprehensive Framework of Security Management and Control in the Scenario of Data Exchange
    Ziran D.
    Yue D.
    Chengqi Y.
    Boran H.
    Mingze G.
    Lin L.
    Data Analysis and Knowledge Discovery, 2022, 6 (01): : 13 - 21
  • [29] Security approaches for electronic health data handling through the Semantic Web: A scoping review
    Lima, Vinicius Costa
    Alves, Domingos
    Bernardi, Filipe Andrade
    Rijo, Rui Pedro Charters Lopes
    SEMANTIC WEB, 2023, 14 (04) : 771 - 784
  • [30] Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security
    Mohammed, Ahmed Burhan
    Fourati, Lamia Chaari
    Fakhrudeen, Ahmed M.
    COMPUTER NETWORKS, 2024, 239