Open Access   Article Go Back

Effectiveness of Security in Software Defined Networks

B. Parvathi Devi1 , V. Vallinayagi2

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-16 , Page no. 122-125, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si16.122125

Online published on May 18, 2019

Copyright © B. Parvathi Devi, V. Vallinayagi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Parvathi Devi, V. Vallinayagi, “Effectiveness of Security in Software Defined Networks,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.122-125, 2019.

MLA Style Citation: B. Parvathi Devi, V. Vallinayagi "Effectiveness of Security in Software Defined Networks." International Journal of Computer Sciences and Engineering 07.16 (2019): 122-125.

APA Style Citation: B. Parvathi Devi, V. Vallinayagi, (2019). Effectiveness of Security in Software Defined Networks. International Journal of Computer Sciences and Engineering, 07(16), 122-125.

BibTex Style Citation:
@article{Devi_2019,
author = {B. Parvathi Devi, V. Vallinayagi},
title = {Effectiveness of Security in Software Defined Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {16},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {122-125},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1291},
doi = {https://doi.org/10.26438/ijcse/v7i16.122125}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i16.122125}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1291
TI - Effectiveness of Security in Software Defined Networks
T2 - International Journal of Computer Sciences and Engineering
AU - B. Parvathi Devi, V. Vallinayagi
PY - 2019
DA - 2019/05/18
PB - IJCSE, Indore, INDIA
SP - 122-125
IS - 16
VL - 07
SN - 2347-2693
ER -

           

Abstract

Software Defined Networks are the new standard in networking. ONF [Open Networking Foundation] contributes a high level architecture for SDN. It has three layers, they are Infrastructure layer, control layer and application layer.[1] From the ONF we gets a well-defined definition for SDN which is as follows, “In the SDN architecture, the control and data planes are decoupled, network intelligence and state are logically centralized, and the underlying network infrastructure is abstracted from the applications” [2]. The network security in the SDN architecture is improved by the centralized control over the network and controls the traffic in run time. This paper analyse and produce the importance and effectives of the SDN architecture for future networking.

Key-Words / Index Term

SDN , ONF, Network security

References

[1] M. D. Yosr Jarraya, Taous Madi, “A survey and a layered taxonomy of software-defined networking,” IEEE Commun. Surveys & Tutorials, vol. 16, no. 4, pp. 1955–1980, Fourth Quarter 2014.
[2] S. Sezer, S. Scott-Hayward, P.-K. Chouhan, B. Fraser, D. Lake, J. Finnegan, N. Viljoen, M. Miller, and N. Rao, “Are we ready for SDN? implementation challenges for software-defined networks,” IEEE Commun. Mag., vol. 51, no. 7, July 2013.
[3] S. Namal, I. Ahmad, S. Saud, M. Jokinen, and A. Gurtov, “Implementation of OpenFlow based cognitive radio network architecture: SDNR,” Wireless Networks, pp. 1–15, 2015.
[4] M. D. Yosr Jarraya, Taous Madi, “A survey and a layered taxonomy of software-defined networking,” IEEE Commun. Surveys & Tutorials, vol. 16, no. 4, pp. 1955–1980, Fourth Quarter 2014.
[5] A. T. Campbell, I. Katzela, K. Miki, and J. Vicente. “Open signaling for ATM, internet and mobile networks (OPENSIG’98).” ACM SIGCOMM Computer Communication Review 29.1 (1999): 97–108.
[6] J. E. Van der Merwe, S. Rooney, I. Leslie, and S. Crosby. “The tempest‐a practical framework for network programmability.” IEEE Network 12.3 (1998): 20–28.
[7] N. Shalaby, Y. Gottlieb, M. Wawrzoniak, and L. Peterson. “Snow on silk: A nodeOS in the Linux kernel.” Active Networks. Springer, Berlin (2002): 1–19.
[8] NIST: National Vulnerability database, http://web.nvd. nist.gov/view/vuln/ detail ? vulnId=CVE-S2009-3733; 2011.
[9] D. Goodin, “Webhost Hack Wipes Out Data for 100,000 Sites ”,http:// www.theregister.co.uk/ 2009 /06/ 08/ webhost_attack, 2009
[10] C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan,“A Survey of Intrusion Detection Techniques in Cloud”, Journal of Network and Computer Applications 36 (2013), pp. 42-57.
[11] S. Shin and G. Gu, “Attacking software-defined networks: a first feasibility study,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013, pp. 165–166.
[12] X. Wen, Y. Chen, C. Hu, C. Shi, and Y. Wang, “Towards a secure controller platform for OpenFlow applications,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013, pp. 171–172.
[13] T. Tsou, H. Yin, H. Xie, and D. Lopez, “Use-Cases for ALTO with Software Defined Networks,” 2012.
[14] Advanced message queuing protocol. [Online]. Available: http://www.amqp.org
[15] Y. Hu, W. Wang, X. Gong, X. Que, and S. Cheng, “On reliabilityoptimized controller placement for software-defined networks,” Communications, China, vol. 11, no. 2, pp. 38–54, Feb 2014.
[16] security enforcement kernel for OpenFlow networks,” in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. HotSDN ’12. ACM, 2012, pp. 121–126.
[17] A. Khurshid, W. Zhou, M. Caesar, and P. B. Godfrey, “Veriflow: Verifying Network-wide Invariants in Real Time,” SIGCOMM Comput.Commun. Rev., vol. 42, no. 4, pp. 467–472, Sep. 2012.
[18] A. Tootoonchian and Y. Ganjali, “HyperFlow: A distributed control plane for OpenFlow,” in Proceedings of the 2010 internet network management conference on Research on enterprise networking. USENIX Association, 2010, pp. 3–3.
[19] S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “Avant-guard: Scalable and vigilant switch flow management in software-defined networks,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ser. CCS ’13. ACM, 2013, pp. 413–424.
[20] A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood, “On controller performance in software-defined networks,” in USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), 2012.