Secure and dependable software defined networks

被引:77
作者
Akhunzada, Adnan [1 ]
Gani, Abdullah [1 ]
Anuar, Nor Badrul [1 ]
Abdelaziz, Ahmed [1 ]
Khan, Muhammad Khurram [2 ]
Hayat, Amir [3 ]
Khan, Samee U. [4 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Ctr Mobile Cloud Comp Res C4MCCR, Kuala Lumpur 50603, Malaysia
[2] King Saud Univ, CoEIA, Riyadh 11451, Saudi Arabia
[3] COMSATS Inst Informat Technol, Dept Comp Sci, Appl Secur Engn Res Grp, Islamabad, Pakistan
[4] N Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58108 USA
关键词
Software defined networks; Programmable networks; Open Flow; Policy enforcement; Middle-boxes; CHALLENGES; TAXONOMY; FUTURE;
D O I
10.1016/j.jnca.2015.11.012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The revolutionary concept of Software Defined Networks (SDNs) potentially provides flexible and well-managed next-generation networks. All the hype surrounding the SDNs is predominantly because of its centralized management functionality, the separation of the control plane from the data forwarding plane, and enabling innovation through network programmability. Despite the promising architecture of SDNs, security was not considered as part of the initial design. Moreover, security concerns are potentially augmented considering the logical centralization of network intelligence. Furthermore, the security and dependability of the SDN has largely been a neglected topic and remains an open issue. The paper presents a broad overview of the security implications of each SDN layer/interface. This paper contributes further by devising a contemporary layered/interface taxonomy of the reported security vulnerabilities, attacks, and challenges of SDN. We also highlight and analyze the possible threats on each layer/interface of SDN to help design secure SDNs. Moreover, the ensuing paper contributes by presenting the state-of-the-art SDNs security solutions. The categorization of solutions is followed by a critical analysis and discussion to devise a comprehensive thematic taxonomy. We advocate the production of secure and dependable SDNs by presenting potential requirements and key enablers. Finally, in an effort to anticipate secure and dependable SDNs, we present the ongoing open security issues, challenges and future research directions. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:199 / 221
页数:23
相关论文
共 148 条
[31]   EMERGING TECHNOLOGIES AND RESEARCH CHALLENGES FOR 5G WIRELESS NETWORKS [J].
Chin, Woon Hau ;
Fan, Zhong ;
Haines, Russell .
IEEE WIRELESS COMMUNICATIONS, 2014, 21 (02) :106-112
[32]  
Choi Y., Implementation of content-oriented networking architecture (cona): A focus on DDoS countermeasure
[33]  
Chung C-J, 2013, IEEE T DEPENDABLE SE, V1
[34]   Toward Digital Asset Protection [J].
Collberg, Christian ;
Davidson, Jack ;
Giacobazzi, Roberto ;
Gu, Yuan Xiang ;
Herzberg, Amir ;
Wang, Fei-Yue .
IEEE INTELLIGENT SYSTEMS, 2011, 26 (06) :8-13
[35]  
Costa V.T.C.a., VULNERABILITY STUDY
[36]   SPHINX: Detecting Security Attacks in Software-Defined Networks [J].
Dhawan, Mohan ;
Poddar, Rishabh ;
Mahajan, Kshiteej ;
Mann, Vijay .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[37]   Software defined networking for security enhancement in wireless mobile networks [J].
Ding, Aaron Yi ;
Crowcroft, Jon ;
Tarkoma, Sasu ;
Flinck, Hannu .
COMPUTER NETWORKS, 2014, 66 :94-101
[38]  
Doria A., 2010, Forwarding and control element separation (forces) protocol specification
[39]  
Dover JeremyM., 2013, A denial of service attack against the open floodlight SDN controller
[40]  
El-Atawy A, 2007, 8 IEEE INT WORKSH PO