Article

 

Software-Defined Networking Security: Pros and Cons Public Deposited

Downloadable Content

Download PDF
https://ir.library.oregonstate.edu/concern/articles/47429c11n

©2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.

This is an author's peer-reviewed final manuscript, as accepted by the publisher. The published article is copyrighted by IEEE - Institute of Electrical and Electronics Engineers and can be found at:  http://www.comsoc.org/commag

Descriptions

Attribute NameValues
Creator
Abstract
  • Software-Defined Networking (SDN) is a new networking paradigm that decouples the forwarding and control planes— traditionally being coupled with one another—while adopting a logically centralized architecture aiming to increase network agility and programability. While many efforts are currently being made to standardize this emerging paradigm, careful attentions need to be paid to security at this early design stage too, rather than waiting until the technology becomes mature, thereby potentially avoiding previous pitfalls made when designing the Internet in the 80’s. This article focuses on the security aspects of SDN networks. We begin by discussing the new security pros that SDN brings and by showing how some of the long-lasting issues in network security can be addressed by exploiting SDN capabilities. Then, we describe the new security threats that SDN is faced with and discuss possible techniques that can be used to prevent and mitigate such threats.
Resource Type
DOI
Date Available
Date Issued
Citation
  • Dabbagh, M., Hamdaoui, B., Guizani, M., & Rayes, A. (2015). Software-Defined Networking Security: Pros and Cons. IEEE Communications Magazine, 53(6 Suppl.), 73-79. doi:10.1109/MCOM.2015.7120048
Series
Rights Statement
Funding Statement (additional comments about funding)
  • This work was made possible by NPRP grant # NPRP 5-319-2-121 from the Qatar National Research Fund (a member of Qatar Foundation).
Publisher
Peer Reviewed
Language
Replaces
Additional Information
  • description.provenance : Made available in DSpace on 2015-10-14T00:57:24Z (GMT). No. of bitstreams: 1 DabbaghMehiarElectricalEngineeringComputerScienceSoftware-DefinedNetworkingSecurity.pdf: 372008 bytes, checksum: 726a2cacebed92885e499d7811a20435 (MD5) Previous issue date: 2015-06
  • description.provenance : Submitted by Deanne Bruner (deanne.bruner@oregonstate.edu) on 2015-10-14T00:48:32Z No. of bitstreams: 1 DabbaghMehiarElectricalEngineeringComputerScienceSoftware-DefinedNetworkingSecurity.pdf: 372008 bytes, checksum: 726a2cacebed92885e499d7811a20435 (MD5)
  • description.provenance : Approved for entry into archive by Deanne Bruner(deanne.bruner@oregonstate.edu) on 2015-10-14T00:57:24Z (GMT) No. of bitstreams: 1 DabbaghMehiarElectricalEngineeringComputerScienceSoftware-DefinedNetworkingSecurity.pdf: 372008 bytes, checksum: 726a2cacebed92885e499d7811a20435 (MD5)

Relationships

Parents:

This work has no parents.

Items