SDN Security Review: Threat Taxonomy, Implications, and Open Challenges
Software-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible, and programmatically efficient configuration of networks to revolutionize network control and management via separation of the control plane and data plane. The SDN technology has evolved in response to the deman...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9760465/ |
_version_ | 1828443902253727744 |
---|---|
author | Mohamed Rahouti Kaiqi Xiong Yufeng Xin Senthil Kumar Jagatheesaperumal Moussa Ayyash Maliha Shaheed |
author_facet | Mohamed Rahouti Kaiqi Xiong Yufeng Xin Senthil Kumar Jagatheesaperumal Moussa Ayyash Maliha Shaheed |
author_sort | Mohamed Rahouti |
collection | DOAJ |
description | Software-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible, and programmatically efficient configuration of networks to revolutionize network control and management via separation of the control plane and data plane. The SDN technology has evolved in response to the demands from large data centers toward all types of networks, from IoT, enterprise, to ISP networks. On the one hand, SDN has provided solutions for high-demand resources, managing unpredictable data traffic patterns, and rapid network reconfiguration. It is further used to enhance network virtualization and security. On the other hand, SDN is still subject to many traditional network security threats. It also introduces new security vulnerabilities, primarily due to its logically centralized control plane infrastructure and functions. In this paper, we conduct a comprehensive survey on the core functionality of SDN from the perspective of secure communication infrastructure at different scales. A specific focus is put forward to address the challenges in securing SDN-based communications, with efforts taken up to address them. We further categorize the appropriate solutions for specific threats at each layer of SDN infrastructures. Lastly, security implications and future research trends are highlighted to provide insights for future research. |
first_indexed | 2024-12-10T21:35:31Z |
format | Article |
id | doaj.art-d7bc57f468ed40d5b79e5d05f67d96b3 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-10T21:35:31Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-d7bc57f468ed40d5b79e5d05f67d96b32022-12-22T01:32:40ZengIEEEIEEE Access2169-35362022-01-0110458204585410.1109/ACCESS.2022.31689729760465SDN Security Review: Threat Taxonomy, Implications, and Open ChallengesMohamed Rahouti0https://orcid.org/0000-0001-9701-5505Kaiqi Xiong1https://orcid.org/0000-0003-2933-8083Yufeng Xin2Senthil Kumar Jagatheesaperumal3https://orcid.org/0000-0002-9516-0327Moussa Ayyash4https://orcid.org/0000-0003-0868-143XMaliha Shaheed5Department of Computer and Information Science, Fordham University, Bronx, NY, USACyber Florida, University of South Florida, Tampa, FL, USARENCI, University of North Carolina at Chapel Hill, Chapel Hill, NC, USAMepco Schlenk Engineering College, Sivakasi, Tamil Nadu, IndiaDepartment of Computing, Information, and Mathematical Sciences and Technology, Chicago State University, Chicago, IL, USADepartment of Computer and Information Science, Fordham University, Bronx, NY, USASoftware-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible, and programmatically efficient configuration of networks to revolutionize network control and management via separation of the control plane and data plane. The SDN technology has evolved in response to the demands from large data centers toward all types of networks, from IoT, enterprise, to ISP networks. On the one hand, SDN has provided solutions for high-demand resources, managing unpredictable data traffic patterns, and rapid network reconfiguration. It is further used to enhance network virtualization and security. On the other hand, SDN is still subject to many traditional network security threats. It also introduces new security vulnerabilities, primarily due to its logically centralized control plane infrastructure and functions. In this paper, we conduct a comprehensive survey on the core functionality of SDN from the perspective of secure communication infrastructure at different scales. A specific focus is put forward to address the challenges in securing SDN-based communications, with efforts taken up to address them. We further categorize the appropriate solutions for specific threats at each layer of SDN infrastructures. Lastly, security implications and future research trends are highlighted to provide insights for future research.https://ieeexplore.ieee.org/document/9760465/Software defined networksOpenFlowsecuritythreatattackvulnerability |
spellingShingle | Mohamed Rahouti Kaiqi Xiong Yufeng Xin Senthil Kumar Jagatheesaperumal Moussa Ayyash Maliha Shaheed SDN Security Review: Threat Taxonomy, Implications, and Open Challenges IEEE Access Software defined networks OpenFlow security threat attack vulnerability |
title | SDN Security Review: Threat Taxonomy, Implications, and Open Challenges |
title_full | SDN Security Review: Threat Taxonomy, Implications, and Open Challenges |
title_fullStr | SDN Security Review: Threat Taxonomy, Implications, and Open Challenges |
title_full_unstemmed | SDN Security Review: Threat Taxonomy, Implications, and Open Challenges |
title_short | SDN Security Review: Threat Taxonomy, Implications, and Open Challenges |
title_sort | sdn security review threat taxonomy implications and open challenges |
topic | Software defined networks OpenFlow security threat attack vulnerability |
url | https://ieeexplore.ieee.org/document/9760465/ |
work_keys_str_mv | AT mohamedrahouti sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges AT kaiqixiong sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges AT yufengxin sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges AT senthilkumarjagatheesaperumal sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges AT moussaayyash sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges AT malihashaheed sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges |