SDN Security Review: Threat Taxonomy, Implications, and Open Challenges

Software-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible, and programmatically efficient configuration of networks to revolutionize network control and management via separation of the control plane and data plane. The SDN technology has evolved in response to the deman...

Full description

Bibliographic Details
Main Authors: Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Senthil Kumar Jagatheesaperumal, Moussa Ayyash, Maliha Shaheed
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9760465/
_version_ 1828443902253727744
author Mohamed Rahouti
Kaiqi Xiong
Yufeng Xin
Senthil Kumar Jagatheesaperumal
Moussa Ayyash
Maliha Shaheed
author_facet Mohamed Rahouti
Kaiqi Xiong
Yufeng Xin
Senthil Kumar Jagatheesaperumal
Moussa Ayyash
Maliha Shaheed
author_sort Mohamed Rahouti
collection DOAJ
description Software-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible, and programmatically efficient configuration of networks to revolutionize network control and management via separation of the control plane and data plane. The SDN technology has evolved in response to the demands from large data centers toward all types of networks, from IoT, enterprise, to ISP networks. On the one hand, SDN has provided solutions for high-demand resources, managing unpredictable data traffic patterns, and rapid network reconfiguration. It is further used to enhance network virtualization and security. On the other hand, SDN is still subject to many traditional network security threats. It also introduces new security vulnerabilities, primarily due to its logically centralized control plane infrastructure and functions. In this paper, we conduct a comprehensive survey on the core functionality of SDN from the perspective of secure communication infrastructure at different scales. A specific focus is put forward to address the challenges in securing SDN-based communications, with efforts taken up to address them. We further categorize the appropriate solutions for specific threats at each layer of SDN infrastructures. Lastly, security implications and future research trends are highlighted to provide insights for future research.
first_indexed 2024-12-10T21:35:31Z
format Article
id doaj.art-d7bc57f468ed40d5b79e5d05f67d96b3
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-10T21:35:31Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-d7bc57f468ed40d5b79e5d05f67d96b32022-12-22T01:32:40ZengIEEEIEEE Access2169-35362022-01-0110458204585410.1109/ACCESS.2022.31689729760465SDN Security Review: Threat Taxonomy, Implications, and Open ChallengesMohamed Rahouti0https://orcid.org/0000-0001-9701-5505Kaiqi Xiong1https://orcid.org/0000-0003-2933-8083Yufeng Xin2Senthil Kumar Jagatheesaperumal3https://orcid.org/0000-0002-9516-0327Moussa Ayyash4https://orcid.org/0000-0003-0868-143XMaliha Shaheed5Department of Computer and Information Science, Fordham University, Bronx, NY, USACyber Florida, University of South Florida, Tampa, FL, USARENCI, University of North Carolina at Chapel Hill, Chapel Hill, NC, USAMepco Schlenk Engineering College, Sivakasi, Tamil Nadu, IndiaDepartment of Computing, Information, and Mathematical Sciences and Technology, Chicago State University, Chicago, IL, USADepartment of Computer and Information Science, Fordham University, Bronx, NY, USASoftware-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible, and programmatically efficient configuration of networks to revolutionize network control and management via separation of the control plane and data plane. The SDN technology has evolved in response to the demands from large data centers toward all types of networks, from IoT, enterprise, to ISP networks. On the one hand, SDN has provided solutions for high-demand resources, managing unpredictable data traffic patterns, and rapid network reconfiguration. It is further used to enhance network virtualization and security. On the other hand, SDN is still subject to many traditional network security threats. It also introduces new security vulnerabilities, primarily due to its logically centralized control plane infrastructure and functions. In this paper, we conduct a comprehensive survey on the core functionality of SDN from the perspective of secure communication infrastructure at different scales. A specific focus is put forward to address the challenges in securing SDN-based communications, with efforts taken up to address them. We further categorize the appropriate solutions for specific threats at each layer of SDN infrastructures. Lastly, security implications and future research trends are highlighted to provide insights for future research.https://ieeexplore.ieee.org/document/9760465/Software defined networksOpenFlowsecuritythreatattackvulnerability
spellingShingle Mohamed Rahouti
Kaiqi Xiong
Yufeng Xin
Senthil Kumar Jagatheesaperumal
Moussa Ayyash
Maliha Shaheed
SDN Security Review: Threat Taxonomy, Implications, and Open Challenges
IEEE Access
Software defined networks
OpenFlow
security
threat
attack
vulnerability
title SDN Security Review: Threat Taxonomy, Implications, and Open Challenges
title_full SDN Security Review: Threat Taxonomy, Implications, and Open Challenges
title_fullStr SDN Security Review: Threat Taxonomy, Implications, and Open Challenges
title_full_unstemmed SDN Security Review: Threat Taxonomy, Implications, and Open Challenges
title_short SDN Security Review: Threat Taxonomy, Implications, and Open Challenges
title_sort sdn security review threat taxonomy implications and open challenges
topic Software defined networks
OpenFlow
security
threat
attack
vulnerability
url https://ieeexplore.ieee.org/document/9760465/
work_keys_str_mv AT mohamedrahouti sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges
AT kaiqixiong sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges
AT yufengxin sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges
AT senthilkumarjagatheesaperumal sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges
AT moussaayyash sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges
AT malihashaheed sdnsecurityreviewthreattaxonomyimplicationsandopenchallenges