Research Output

A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers

  Software De ned Network (SDN) and Network Virtualization (NV) are emerged paradigms that simpli ed the control and management of the next generation networks, most importantly, Internet of Things (IoT), Cloud Computing, and Cyber-Physical Systems. The Internet of Things (IoT) includes a diverse range of a vast collection of heterogeneous devices that require interoperable communication, scalable platforms and security provisioning. Security provisioning to an SDN based IoT network pose a real security challenge leading to various serious security threats due to the connection of various heterogeneous devices having a wide range of access protocols . Furthermore, the logical centralized controlled intelligence of the SDN architecture represents a plethora of security challenges due to its single point of failure. it may throw the en tire network into chaos and thus expose it to various known and unknown security threats and attacks. security of SDN controlled IoT environment is still in infancy and thus remains the prime research agenda for both the industry and academia. This paper comprehensively reviews the current state-of-the-art security threats, vulnerabilities and issues at the control plane. Moreover, this paper contributes by presenting a detailed classfi cation of various security attacks on the control layer. A comprehensive state-of-the-art review of the latest mitigation techniques for various security breaches is also presented. Finally, the paper presents future research directions and challenges for further investigation down the line.

  • Type:

    Article

  • Date:

    21 March 2019

  • Publication Status:

    Accepted

  • ISSN:

    1532-0626

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

  • Funders:

    Edinburgh Napier Funded

Citation

Han, T., Jan, S., Tan, T., Usman, M., Jan, M., Khan, R., & Xu, Y. (in press). A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers. Concurrency and Computation: Practice and Experience,

Authors

Keywords

Software De fined Networks; Controller; Denial of Service attacks; Spoo fing attacks; Malicious injection attacks; Link Flooding attacks

Monthly Views:

Available Documents

  • pdf

    A comprehensive survey of security threats and their mitigation techniques...
    File currently unavailable for download , please contact Z.Tan@napier.ac.uk to request a copy

    25MB

    This is the peer reviewed version of the following article: Han, T., Jan, S., Tan, T., Usman, M., Jan, M., Khan, R., & Xu, Y. (in press). A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers. Concurrency and Computation: Practice and Experience, which will be published in final form at [Link to final article using the DOI]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions

  • Downloadable citations

    HTML BIB RTF