Shamsan et al., 2021 - Google Patents
Security Issues and Challenges in SDNShamsan et al., 2021
- Document ID
- 3866575457663764484
- Author
- Shamsan A
- Faridi A
- Publication year
- Publication venue
- International Conference on Advances in Cyber Security
External Links
Snippet
Abstract Software Defined Network SDN is a programmable network with the new architecture of separating control functions from the switching devices. The new paradigm of SDN still not secured enough due to the differences in compared to the legacy network. SDN …
- 239000008186 active pharmaceutical agent 0 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0803—Configuration setting of network or network elements
- H04L41/0813—Changing of configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0893—Assignment of logical groupings to network elements; Policy based network management or configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/085—Keeping track of network configuration
- H04L41/0856—Keeping track of network configuration by archiving or backing up configuration information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/02—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/12—Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
- H04L67/125—Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks involving the control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/16—Service discovery or service management, e.g. service location protocol [SLP] or Web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Maleh et al. | A comprehensive survey on SDN security: threats, mitigations, and future directions | |
| Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
| Jimenez et al. | A survey of the main security issues and solutions for the SDN architecture | |
| Shaghaghi et al. | Software-defined network (SDN) data plane security: issues, solutions, and future directions | |
| Scott-Hayward et al. | A survey of security in software defined networks | |
| Jangjou et al. | A comprehensive survey on security challenges in different network layers in cloud computing | |
| Yu et al. | A survey on security issues in services communication of Microservices‐enabled fog applications | |
| Shu et al. | Security in software-defined networking: Threats and countermeasures | |
| Pattaranantakul et al. | NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures | |
| Abdelrahman et al. | Software‐defined networking security for private data center networks and clouds: vulnerabilities, attacks, countermeasures, and solutions | |
| Sahoo et al. | Toward secure software-defined networks against distributed denial of service attack. | |
| Yoon et al. | Flow wars: Systemizing the attack surface and defenses in software-defined networks | |
| Chen et al. | Software-defined mobile networks security | |
| US20170214694A1 (en) | A Security and Trust Framework for Virtualized Networks | |
| Thimmaraju et al. | Outsmarting network security with SDN teleportation | |
| CN111295640B (en) | Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation | |
| Rauf et al. | Application threats to exploit northbound interface vulnerabilities in software defined networks | |
| Tsugawa et al. | Cloud computing security: What changes with software-defined networking? | |
| Köksal et al. | Distributed denial‐of‐service attack mitigation in network functions virtualization‐based 5G networks using management and orchestration | |
| Goud et al. | Security challenges and related solutions in software defined networks: a survey | |
| Singh et al. | A study on secure network slicing in 5G | |
| Tseng et al. | A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking | |
| Pandya et al. | Framework for securing SDN southbound communication | |
| Shamsan et al. | Security Issues and Challenges in SDN | |
| Combe et al. | An sdn and nfv use case: Ndn implementation and security monitoring |