Enabling security functions with SDN: A feasibility study

Cited 79 time in webofscience Cited 92 time in scopus
  • Hit : 907
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorYoon, Changhoonko
dc.contributor.authorPark, Taejuneko
dc.contributor.authorLee, Seungsooko
dc.contributor.authorKang, Heedoko
dc.contributor.authorShin, Sko
dc.contributor.authorZhang, Zonghuako
dc.date.accessioned2015-11-20T08:56:12Z-
dc.date.available2015-11-20T08:56:12Z-
dc.date.created2015-07-30-
dc.date.created2015-07-30-
dc.date.issued2015-07-
dc.identifier.citationCOMPUTER NETWORKS, v.85, pp.19 - 35-
dc.identifier.issn1389-1286-
dc.identifier.urihttp://hdl.handle.net/10203/200889-
dc.description.abstractSoftware-defined networking (SON) is being strongly considered as the next promising networking platform, and studies regarding SON have been actively conducted accordingly. However, the security of SDN remains undefined and unknown when considering the enhancement of network security in SDN. In this paper, we verify whether SDN can enhance network security. Specifically, the idea of enabling security functions with diverse SDN features is explored thoroughly. In order to elucidate the feasibility of SDN-based security functions, we implement four types of security functions with SON in Floodlight applications: (i) in-line mode security functions (e.g. firewalls and IPS), (ii) passive mode security functions (e.g. IDS), (iii) network anomaly detection functions (e.g. scan and DDoS detector), and (iv) advanced security functions (e.g. stateful firewall and reflector networks). Furthermore, we focus on discovering issues that might arise throughout the implementation of SDN-based security applications and discuss how these issues can be addressed. In order to appropriately prove the feasibility of the SDN-based security applications, we evaluate our Floodlight applications in real testbeds that consist of SON-enabled switches and a number of physical hosts.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE BV-
dc.titleEnabling security functions with SDN: A feasibility study-
dc.typeArticle-
dc.identifier.wosid000357239800002-
dc.identifier.scopusid2-s2.0-84937973181-
dc.type.rimsART-
dc.citation.volume85-
dc.citation.beginningpage19-
dc.citation.endingpage35-
dc.citation.publicationnameCOMPUTER NETWORKS-
dc.identifier.doi10.1016/j.comnet.2015.05.005-
dc.contributor.localauthorShin, S-
dc.contributor.nonIdAuthorPark, Taejune-
dc.contributor.nonIdAuthorLee, Seungsoo-
dc.contributor.nonIdAuthorKang, Heedo-
dc.contributor.nonIdAuthorZhang, Zonghua-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorNetwork security-
dc.subject.keywordAuthorSoftware-defined networking security-
dc.subject.keywordAuthorSDN security-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 79 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0