skip to main content
10.1145/2670386.2670390acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiptcommConference Proceedingsconference-collections
research-article

Network security through software defined networking: a survey

Published:01 October 2014Publication History

ABSTRACT

Network security is a predominant topic both in academia and industry. Many methods and tools have been proposed but the attackers are still able to launch massive and effective attacks. Keeping the pace with the new threats appearing or becoming more sophisticated everyday is of a paramount of importance. Software Defined Networking (SDN) has recently emerged and promotes the programmability of the networks, which thus allows to enable in-network security functions. This includes firewalls, monitoring applications or middlebox support through OpenFlow devices. Therefore, this paper reviews the related approaches which have been proposed by identifying their scope, their practicability, their advantages and their drawbacks.

References

  1. H. Abdelnur, R. State, and O. Festor. Advanced Network Fingerprinting. In Recent Advances in Intrusion Detection -- RAID. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. R. Ballard, I. Rae, and A. Akella. Extensible and scalable network monitoring using opensafe. In Internet Network Management Conference on Research on Enterprise Networking, Berkeley, CA, USA, 2010. USENIX. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Bates, K. Butler, A. Haeberlen, M. Sherr, and W. Zhou. Let SDN be your eyes: Secure forensics in data center networks. In Proceedings of the NDSS Workshop on Security of Emerging Network Technologies (SENT'14), Feb. 2014.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. R. Chowdhury, M. F. Bari, R. Ahmed, and R. Boutaba. Payless: A low cost network monitoring framework for software defined networks. In Network Operations and Management Symposium (NOMS), 2014.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. K. Fayazbakhsh, V. Sekar, M. Yu, and J. C. Mogul. Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions. In SIGCOMM Workshop on Hot Topics in Software Defined Networking - HotSDN. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. H. Jafarian, E. Al-Shaer, and Q. Duan. Openflow random host mutation: Transparent moving target defense using software defined networking. In Hot Topics in Software Defined Networks - HotSDN. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Jose, M. Yu, and J. Rexford. Online measurement of large traffic aggregates on commodity switches. In Conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services -- Hot-ICE. USENIX, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Lahmadi and O. Festor. Secsip: A stateful firewall for sip-based networks. In International Conference on Symposium on Integrated Network Management - IM. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: Enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev., 38(2): 69--74, Mar. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. A. Mehdi, J. Khalid, and S. A. Khayam. Revisiting traffic anomaly detection using software defined networking. In Recent Advances in Intrusion Detection -- RAID. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Moshref, M. Yu, and R. Govindan. Resource/accuracy tradeoffs in software-defined measurement. In SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. networks. Worldwide infrastructure security report (2013 report). Technical report, 2014.Google ScholarGoogle Scholar
  13. G. Ormazabal, S. Nagpal, E. Yardeni, and H. Schulzrinne. Principles, Systems and Applications of IP Telecommunications - IPTComm. chapter Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems. Springer, 2008.Google ScholarGoogle Scholar
  14. T. Peng, C. Leckie, and K. Ramamohanarao. Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Comput. Surv., 39(1), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Perlman. An algorithm for distributed computation of a spanningtree in an extended lan. In Proceedings of the Ninth Symposium on Data Communications, SIGCOMM. ACM, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Phemius and M. Bouet. Monitoring latency with openflow. In Network and Service Management (CNSM), 2013.Google ScholarGoogle ScholarCross RefCross Ref
  17. S. Shin, V. Yegneswaran, P. Porras, and G. Gu. Avant-guard: Scalable and vigilant switch flow management in software-defined networks. In SIGSAC Conference on Computer & Communications Security - CCS. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Shirali-Shahreza and Y. Ganjali. Flexam: Flexible sampling extension for monitoring and security applications in openflow. In SIGCOMM Workshop on Hot Topics in Software Defined Networking. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Suh, S. H. Park, B. Lee, and S. Yang. Building firewall over the software-defined network controller. In Advanced Communication Technology (ICACT), 2014 16th International Conference on, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. Tootoonchian, M. Ghobadi, and Y. Ganjali. Opentm: Traffic matrix estimator for openflow networks. In International Conference on Passive and Active Measurement - PAM. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. N. L. M. Van Adrichem, D. Doerr, and F. A. Kuipers. OpenNetMon: Network Monitoring in OpenFlow Software-Defined Networks. In Network Operations and Management Symposium (NOMS). IEEE/IFIP, 2014.Google ScholarGoogle Scholar
  22. C. Yu, C. Lumezanu, Y. Zhang, V. Singh, G. Jiang, and H. V. Madhyastha. Flowsense: Monitoring network utilization with zero measurement cost. In International Conference on Passive and Active Measurement - PAM. Springer, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Yu, L. Jose, and R. Miao. Software defined traffic measurement with opensketch. In Conference on Networked Systems Design and Implementation - NSDI. USENIX, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Y. Zhang. An adaptive flow counting method for anomaly detection in sdn. In Conference on Emerging Networking Experiments and Technologies - CoNEXT. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Network security through software defined networking: a survey

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            IPTComm '14: Proceedings of the Conference on Principles, Systems and Applications of IP Telecommunications
            October 2014
            65 pages
            ISBN:9781450321242
            DOI:10.1145/2670386

            Copyright © 2014 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 October 2014

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate18of62submissions,29%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader