Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI, and MTD Approaches to Security Solutions

被引:10
|
作者
Abdi, Abdinasir Hirsi [1 ]
Audah, Lukman [1 ,2 ]
Salh, Adeb [3 ]
Alhartomi, Mohammed A. [4 ]
Rasheed, Haroon [5 ]
Ahmed, Salman [6 ]
Tahir, Ahmed [7 ]
机构
[1] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, Adv Telecommun Res Ctr ATRC, Parit Raja 86400, Malaysia
[2] Univ Tun Hussein Onn Malaysia, Fac Engn Technol, Parit Raja 86400, Malaysia
[3] Univ Tunku Abdul Rahman UTAR, Fac Informat & Commun Technol, Kampar 31900, Malaysia
[4] Univ Tabuk, Dept Elect Engn, Tabuk 71491, Saudi Arabia
[5] Bahria Univ Karachi Campus, Dept Elect Engn, Karachi 75300, Pakistan
[6] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, VLSI & Embedded Technol VEST Focus Grp, Parit Raja 86400, Malaysia
[7] Somtel Telecommun Co, Engn Dept, Bosaso 25290, Bari, Somalia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; Artificial intelligence; Surveys; Reviews; Protocols; Programming; IP networks; Computer security; Software defined networking; AI; control plane; cybersecurity; data plane; moving target defense; SDN security; southbound interface; traditional SDN security; MOVING TARGET DEFENSE; SOFTWARE-DEFINED NETWORKS; AUTHENTICATION; ISSUES; CLASSIFICATION; VERIFICATION; CHALLENGES; MITIGATION; ATTACKS; SERVICE;
D O I
10.1109/ACCESS.2024.3393548
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed network management significantly. By integrating data and control, SDN offers unparalleled flexibility and responsiveness, thereby overcoming the limitations of conventional network architectures. However, a centralized controller, which is a hallmark of SDN, is a double-edged security sword that offers easy control. This also becomes a dangerous point of failure for the entire network. To the best of our knowledge, this is the first comprehensive study to explore traditional-based, artificial intelligence (AI)-based, and moving target defense (MTD) approaches to securing SDN. The study begins with a survey of traditional security solutions for SDN, encompassing authentication, authorization, encryption, security protocols, firewalls, and flow verification, by addressing security threats and vulnerabilities in both data and control planes. The study then investigates the application of AI-based security solutions in an SDN environment, focusing on how Machine Learning (ML) and Deep Learning (DL) techniques are leveraged to address advanced security threats. Additionally, the survey examines MTD mechanisms within data and control plane security. Several in-depth techniques, including the randomization of Internet Protocol (IP) and Media Access Control (MAC) addresses, port numbers, and flow tables, and delving into the relationship between security threats, MTD strategies, and the specific controllers employed in experimental implementations. We utilized the widely recognized STRIDE cybersecurity framework to systematically identify and evaluate the potential threats to SDN security. Our analysis resulted in a comprehensive list of security challenges, and we propose future research directions aimed at addressing emerging threats in both the data and control planes.
引用
收藏
页码:69941 / 69980
页数:40
相关论文
共 34 条
  • [31] Data security and privacy concerns of AI-driven marketing in the context of economics and business field: an exploration into possible solutions
    Alhitmi, Hitmi Khalifa
    Mardiah, Alin
    Al-Sulaiti, Khalid Ibrahim
    Abbas, Jaffar
    COGENT BUSINESS & MANAGEMENT, 2024, 11 (01):
  • [32] A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems
    Mohan, Athira M.
    Meskin, Nader
    Mehrjerdi, Hasan
    ENERGIES, 2020, 13 (15)
  • [33] A Comprehensive review on 5G-based Smart Healthcare Network Security: Taxonomy, Issues, Solutions and Future research directions
    Ahad, Abdul
    Ali, Zahra
    Mateen, Abdul
    Tahir, Mohammad
    Hannan, Abdul
    Garcia, Nuno M.
    Pires, Ivan Miguel
    ARRAY, 2023, 18
  • [34] Data Security, Intrusion Detection, Database Access control, Policy Creation and Anomaly Response Systems-A Review
    Parmar, Jitendra
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,