Detailed Review on The Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks in Software Defined Networks (SDNs) and Defense Strategies

Elvis Tamakloe(1*), Benjamin Kommey(2), Emmanuel Akowuah(3), Daniel Opoku(4),

(1) Kwame Nkrumah University of Science and Technology, PMB UPO, 00233, Ghana
(2) Kwame Nkrumah University of Science and Technology, PMB UPO, 00233, Ghana
(3) Kwame Nkrumah University of Science and Technology, PMB UPO, 00233, Ghana
(4) Kwame Nkrumah University of Science and Technology, PMB UPO, 00233, Ghana
(*) Corresponding Author

Abstract


The development of Software Defined Networking (SDN) has altered the landscape of computer networking in recent years. Its scalable architecture has become a blueprint for the design of several advanced future networks. To achieve improve and efficient monitoring, control and management capabilities of the network, software defined networks differentiate or decouple the control logic from the data forwarding plane. As a result, logical control is centralized solely in the controller. Due to the centralized nature, SDNs are exposed to several vulnerabilities such as Spoofing, Flooding, and primarily Denial of Service (DoS) and Distributed Denial of Service (DDoS) among other attacks. In effect, the performance of SDN degrades based on these attacks. This paper presents a comprehensive review of several DoS and DDoS defense/mitigation strategies and classifies them into distinct classes with regards to the methodologies employed. Furthermore, suggestions were made to enhance current mitigation strategies accordingly.


Full Text:

PDF

References


R. Mijumbi, J. Serrat, J.-L. Gorricho, N. Bouten, F.De Turck and R. Boutaba, Network Function Virtualization: State-of-the-Art and Research Challenges. IEEE Communications Surveys & Tutorials, 18( 1) (2016) 236-262.

D. Kreutz, F.M.V. Ramos, P.E. Verissimo, C.E. Rothenberg, S. Azodolmolky, and S. Uhlig, Software-Defined Networking: A Comprehensive Survey. Proceeding of the IEEE, 103(1) (2015) 14-76.

R. Masoudi, and A. Ghaffari, Software defined networks: A survey. Journal of Network and Computer Applications, 67 (2016) 1-25. 2016.

X. Zhang, L.Cui, K. Wei, F.P. Tso, Y. Ji, W. Jia, A survey on stateful data plane in software defined networks. Computer Networks. 184, (2021) 107597.

Q. Waseem, W.I.S.W. Din, A. Aminuddin, M.H. Mohammed, R.F.A. Aziza, Software-Defined Networking (SDN): A Review. 5th International Conference on Information and Communications Technology, (2022) 30-35.

M. Imran, M.H. Durad, F.A. Khan, and A. Derhab, Toward an optimal solution against Denial of Service attacks in Software Defined Networks. Future Generation Computer Systems 92, (2019) 444-453.

Q. Yan, F.R. Yu, Q. Gong, and J. Li, Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey. Some Reseach Issues, and Challenges. IEEE Communications Surveys & Tutorials, 18 (1) (2016) 602-622.

I. Ahmad, S. Namal, M. Ylianttila,and A. Gurtov, Security in software defined networks: A survey. IEEE Communications Surveys & Tutorials, 17(4) (2015) 2317-2346.

N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker and J. Turner, OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2) (2008) 69-74.

K. Alghamdi, and R. Braun, Software Defined Network (SDN) and OpenFlow Protocol in 5G Network.Communications and Networks 12 (2020) 28-40.

K. Rowan, V. Kotronis, and P. Smith, Openflow: A security analysis. 21st IEEE International Conference on Network Protocols, IEEE. (2013).

A. Izzat, and D. Xu, Security of software defined networks: A survey. Computer Security, 53 (2015) 79-108.

M.D. Firoozjaei, J.P. Jeong, H. Ko, H. Kim, Security challenges with network functions visualization. Future Generation Computer Systems, 67 (2017) 315-324.

H. Beitollahi, and G. Deconinck, Analyzing well-known countermeasures against distributed denial of service attacks. Computer Communication, 35(11) (2012) 1312-1332.

A. Shameli-Sendi, M. Pourzandi, M. Fekih-Ahmed, and M. Cheriet, Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing. Journal of Network and Computer Applications, 58 (2015) 165-179.

J. Suárez-Varela, and P. Barlet-Ros, Flow monitoring in Software Defined Networks: Finding the accuracy/performance tradeoffs. Computer Networks, 135 (2018) 289-301.

M.B. Jiménez, D. Fernández, J.E. Rivadeneira, L. Bellido, and A. Cárdenas, A Survey of the Main Security Issues and Solutions for the SDN Architecture. IEEE Access, 9 (2021) 122016-122038.

J.F. Balarezo, S. Wang, K.G. Chavez, A. Al-Hourani, and S. Kandeepan, “A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual network.” Engineering Science and Technology, an International Journal , 31 (2022) 1-15.

C. Hu, K. Hou, H. Li, R. Wang, P. Zheng, P. Zhang, and H. Wang, SoftRing: TAming the reactive model for software defined networks. 2017 IEEE 25th International Conference on Network Protocols, ICNP, IEEE, (2017) 1-10.

K. Kalkan, G. Gür, and F. Alagöz, SDNScore: A statistical defense mechanism against DDoS attacks in SDN environment. Computers and Communication (ISCC), 2017 IEEE Symposium, IEEE , (2017) 669-675.

M. Alsaeedi, M.M. Mohammad, and A.A. Al-Roubaiey, Toward adaptive and scalable OpenFlow-SDN flow control: A survey. IEEE Access, 7 (2019) 107346-107379.

Z. Latif, K. Sharif, F. Li, M.M. Karim, S. Biswas, and Y. Wang, A comprehensive survey of interface protocols for software defined networks. Journal of Network and Computer Applications, 156 (2020).

M.P. Singh, and A. Bhandari, New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges. Computer Communications, 154 (2020) 509-527.

K. Ahmad, S.S.A. Ali, S.R. Bin, A. Muhammad, M.N. Rafidah, and S. Shahaboddin, Mobile botnet attacks-an emerging threat: Classification, review and open issues. KSII Transactions on Internet and Information System, 9 (4) (2015) 1471-1492.

Y. Lui, B. Zhao, P. Zhao, P. Fan, and H. Liu, A survey: Typical security issues of software-defined networking. China Communication, 16 (7) (2019) 13-31.

Y. Xiao, Zj. Fan, A. Nayak, and Cx. Tan, Discovery method for distributed denial-of-service attack behaviour in SDNs using a feature-pattern graph model. Frontiers of Information Technology and Electronic Engineering, 20 ( 2019) 1195-1208.

S.Q.A. Shah, F.Z. Khan, and M. Ahmad, The impact and mitigation of ICMP based economic denial of sustainability attack in cloud computing environment using software defined network. Computer Networks, 187 (2021).

M. Ayan, S. Misra, and I. Maity, Buffer size evaluation of openflow systems in software-defined networks. IEEE Systems Journal, 13 (2) (2019) 1359-1366.

A. Mondal, S. Misra, and I. Maity, Buffer Size Evaluation of OpenFlow Systems in Software-Defined Networks. IEEE Systems Journal, 13(2) (2019) 1359-1366.

Z. Guo, Y. Xu, R. Liu, A. Gushchin, Ky. Chen, A. Walid, and H.J. Chao, Balacing flow table occupancy and link utilization in software-defined networks. Future Generation Computer Systems, 89 (2018) 213-223.

R. Swami, M. Dave, and V. Ranga, Software-defined Networking-based DDoS Defense Mechanisms. ACM Computing Surveys, 52(2) (2019) 1-36.

A. Shaghaghi, M.A. Kaafar, R. Buyya, and S. Jha, Software-defined network (SDN) data plane security: Issues, solution, and future directions. Handbook of Computer Networks and Cyber Security. Springer, (2020) 341-387.

I. Farris, T. Taleb, Y. Khettab, and J. Song, A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems. IEEE Communications Surveys & Tutorials, 21(1) (2019) 812-837.

D.B. Rawat, and S.R. Reddy, Software Defined Networking Architecture, Security and Energy Efficient: A Survey. IEEE Communications Surveys & Tutorials, 19(1) (2017) 325-346.

M.P. Novaes, L.F. Carvalho, J. Lloret, and M.L. Proença Jr,. Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments. Future Generation Computer Systems, 125 (2021) 156-167.

X. Zhang, Y. Zhou, S. Pei, J. Zhuge, and Chen, Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks. IEEE Access, 8 (2020) 10989-10996.

K. Groose, N. Papernot, P. Manoharan, M. Backes, and P. McDaniel, Adversarial Examples for Malware Detection. S.N. Foley, D. Gollmann, E. Snekkenes (Eds.) Computer Security - ESORICS 2017, Springer International Publishing, Cham, (2017) 62-79.

T.E. Ali, Y.-W. Chong, and S. Manickam, Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review. Applied Sciences, 13(5) (2023) 3183. 2023

T.V. Phan, T.M.R. Gias, S.T. Islam, T.T. Huong, N.H. Thanh, and T. Bauschert, Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-Learning Based Defence Framework. 2019. IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, (2019) 1-6.

M.A. Albahar, Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environment. Hindawi; Security and Communication Networks, (2019) 1-9.

M. Belyaev, and S. Gaivoronski, Towards load balancing in SDN-networking during DDoS-attacks. 2014 International Science and Technology Conference (Modern Networking Technologies)(MoNeTeC), Moscow, Russia, (2014) 1-6.

D. Yin, L. Zhang, and K. Yang, A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework. IEEE Access, 6 (2018) 24694-24705.

R. Kandoi, and M. Antikainen, Denial-of-service attacks in OpenFlow SDN networks. 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, (2015) 1322-1326.

S. Shin, and G. Gu, Attacking software-defined networks: a first feasibility study. Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, (2013) 165-166.

L. Dridi, and M.F. Zhani, SDN-Guard: DoS Attacks Mitigation in SDN Networks. 2016 5th IEEE International Conference on Cloud Networking (Cloudnet), Pisa, Italy, (2016) 212-217.

B. Wang, Y. Zheng, W. Lou, and Y.T. Hou, DDoS attack protection in the era of cloud computing and Software-Defined Networking. Computer Networks, 81 (2015) 308-319.

P. Rengaraju, V.R. Ramanan, and C.-H. Lung, Detection and preventing of DoS attacks in Software-Defined Cloud networks. 2017 IEEE Conference on Dependable and Secure Computing, Taipei, (2017), 217-223.

S. Fichera, L. Galluccio, S.C. Grancagnolo, G. Morabito, and S. Palazzo, OPERETTA: An Openflow-based Remedy to Mitigate TCP SYNFLOOD Attacks against web servers. Computer Networks, 92, (2015) 89-100.

L.F. Carvalho, T. Abrāo, Ld. S. Mendes, and M.L. Proença Jr, An ecosystem for anomaly detection and mitigation in software-defined networking. Experts Systems with Applications, 104 (2018) 121-133.

M. Ambrosin, M. Conti, F. De Gaspari, and R. Poovendran, LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking. IEEE/ACM Transactions on Networking, 25(2) (2017) 1206-1219.

A. Shoeb, and T. Chithralekha, Resource management of switches and controller during saturation time to avoid DDoS in SDN. 2016 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatoree, India, (2016) 152-156.

W. Lei, and C. Fung, FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks. 2015 IEEE International Conference on Communication (ICC), London, UK, (2015) 5254-5259.

S. Padmaja, and V. Vetriselvi, Mitigation of switch-Dos in software defined network. 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, (2016) 1-5.

P. Bera, A. Saha, and S.K. Setua, Denial of service attack in software defined network. 2016 5th International Conference on Computer Science and Network Technology (ICCSNT), Changchun, China, (2016) 497-501.

Q. Yan, Q. Gong, and F.R. Yu, Effective software-defined networking controller scheduling method to mitigate DDoS attacks. Electronics Letters, 53(7) (2017) 469-471.

H. Wang, L. Xu, and G. Gu, Flood Guard: A DoS Attack Prevention Extension in Software-Defined Networks. 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Rio de Janeiro, Brazil, (2015) 239-250.

M. Kuerban, Y. Tian, Q. Yang, Y. Jia, B. Huebert and D. Poss, FlowSec: DOS Attack Mitigation Strategy on SDN Controller. 2016 IEEE International Conference on Networking, Architecture and Storage (NAS), Long Beach, CA, USA, (2016) 1-2.

K. Hong, Y. Kim, H. Choi, and J. Park, SDN-Assisted Slow HTTP DDoS Attack Defense Method. IEEE Communication Letters, 22(4) (2018) 688-691.

L. Wang, Q. Li, Y. Jiang, and J. Wu, Towards mitigating link flooding attack via incremental SDN development. IEEE Symposium on Computers and Communication, ISCC, (2016) 397-402.

C. Li, Y. Wu, X. Yuan, Z. Sun, W. Wang, X. Li, L. Gong, Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN. International Journal of Communication Systems, 31(5) (2018) e3497.

Z.A. El Houda, A.S. Hafid, L. Khoukhi, Cochain-SC: An Intra- and Inter-Domain Ddos Mitigation Scheme Based on Blockchain Using SDN and Smart Contract. IEEE Access, 7 (2019) 98893-98907.

J. Cui, J. He, Y. Xu, H. Zhong, TDDAD: Time-based detection and defense scheme against DDoS attack on SDN controller. Australasian Conference on Information Security and Privacy. Springer. (2018) 649-665.

Z.A. El Houda, A. Hafid, and L. Khoukhi, Co-IoT: A Collaborative DDoS Mitigation Scheme in IoT Environment Based on Blockchain Using SDN. 2019 IEEE Global Communication Conference (GLOBECOM), Waikoloa, HI, USA. (2019) 1-6.

B. Rodrigues, T. Bocek, A. Lareida, D. Hausheer, S. Rafati, and B. Stiller, A blockchain-based architecture for collaborative DDoS mitigation with smart contracts. IFIP International Conference on Autonomous Infrastructure, Management and Security. Springer, Cham. (2017) 16-29.

J.H. Jafarian, E.Al Shaer, and Q. Duan, Formal approach for route agility against persistent attackers. Lecture Notes in Computer Science, 8134 (2013) 237-254.

S. Shin, V. Yegneswaran, P. Porras, and G. Gu, AVANT-GUARD: Scalable and vigilant switch flow management in softare-defined networks. ACM SIGSAC Conference on Computer and Communications Security, (CCS), (2013) 413-424.

Y.E. Oktian, S. Lee, and H. Lee, Mitigating denial of service (DoS) attacks in openflow networks. International Conference on Information and Communication Technology Convergence, (ICTC). (2014) 325-330.

A.F.M. Piedrahita, S. Rueda, D.M.F. Mattos, and O.C.M.B. Duarte, Flowfence: A denial of service defense system for software defined networking. Global Information Infrastructure and Networking Symposium, GIIS. (2015) 1-6.

G. Shang, P. Zhe, X. Bin, H. Aiqun, and R. Kui, Flooddefender: Protecting data and control plane resources under SDN-aimed DoS attacks. INFOCOM 2017-IEEE Conference on Computer Communication, (2017) 1-9.

T. Wang, H. Chen, G. Cheng, and Y. Lu, SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction. Network Security and Management in SDN, (2018).

S. Wang, S. Chandrasekharan, K. Gomez, S. Kandeepan, A. Al-Hourani, M.R.Asghar, G. Russello, and P. Zanna, SECOD: SDN Secure Control and Data Plane Algorithm for Detecting and Defending Against DoS Attacks. NOMS 2018 IEEE/IFIP Network Operations and Management Symposium. IEEE. (2018) 1-5.

N. Goksel, and M. Demirci, DoS attack detection using packets statistics in SDN. International Symposium on Networks, Computers, and Communications, (ISNCC), IEEE. (2019) 1-6.

R. Xie, M. Xu, J. Cao, and Q. Li, Softguard: Defend against the low-rate TCP attack in SDN. 2019 IEEE International Conference on Communication (ICC). (2019)1-6.

R. Mohammadi, R. Javidan, and M. Conti, SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks. IEEE Transactions on Network and Service Management, 14(2) (2017) 487-497.

K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Computer Networks, 62 (2014) 122-136.

R. Miao, M. Yu, and N. Jain, NIMBUS: Cloud-scale attack detection and mitigation. ACM SIGCOMM Computer Communications. Rev.44. (2014) 121-122.

J. Wang, R. Wen, J. Li, F. Yan, B. Zhao, and F. Yu, Detecting and Mitigating Target Link-Flooding Attacks Using SDN. IEEE Transactions on Dependable and Secure Computing. 16(6) (2019) 944-956.

J. Zheng, Q. Li, G. Gu, J. Cao, D.K.Y. Yau, and J. Wu, Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. IEEE Transactions on Information Forensics and Security, 13(7) (2018) 1838-1853.

J. Xing, W. Wu, and A. Chen, Architecting Programmable Data Plane Defense into the Network with FastFlex. HotNets ʹ19: Proceedings of the 18th ACM Workshop on Hot Topics in Networks. (2019) 161-169.

M. Zhang, G. Li, S. Wang, C. Liu, A. Chen, H. Hu, G. Gu, Q. Li, M. Xu, and J. Wu, Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. Network and Distributed Systems Security (NDSS) Symposium 2020. (2020) 1-18.

A. Hussein, I.H. Elhajj, A. Chehab, and A. Kayssi, SDN security plane: An architecture for resilient security services. IEEE International Conference on Cloud Engineering Workshop. (IC2EW), (2016) 54-59.

O. Joldzic, Z. Djuric, and P. Vuletic, A transparent and scalable anomaly-based DoS detection method. Computer Networks, 104 (2016) 27-42.

J. Li, S. Berg, M. Zhang, P. Reiher, and T. Wei, Drawbridge: software-defined DDoS-resistant traffic engineering. SIGCOMM '14: Proceedings of the 2014 ACM conference on SIGCOMM, (2014) 591-592.

S. Hammed, and H.A. Khan, SDN Based Collaborative Scheme for Mitigation of DDoS Attacks. Future Internet, 10(3) (2018) 1-18.

J. Francois, I. Aib, and R. Boutaba, FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks. IEEE/ACM Transactions on Networking, 20(6) (2012) 1828-1841.

S. Debroy, P. Calyam, M. Nguyen, R.L. Neupane, B. Mukherjee, A.K. Eeralla, K. Salah, Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based System. IEEE Transactions on Network and Service Management, 17(2) (2020) 890-903.

M. Samir, M. Azab, and E. Samir, SD-CPC: SDN Controller Placement Camouflage based on Stochastic Game for Moving-target Defense. Computer Communications, 168 (2021) 75-92.

A. Aydeger, N. Saputro, and K. Akkaya, A moving target defense and network forensics framework for ISP networks using SDN and NFV. Future Generation Computer Systems, 94 (2019) 496-509.

S. Debroy, P. Calyam, M. Nguyen, A. Stage, and V. Georgiev, Frequency-minimal moving target defense using software-defined networking. 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, USA. (2016) 1-6.

Y. Shi, H. Zhang, J. Wang, F. Xiao, J. Huang, D. Zha, H. Hu, F. Yan, and B. Zhao, CHAOS: An SDN-Based Moving Target Defense System. Hindawi: Security and Communication Networks, (2017) 1-11.

K. Doshi, Y. Yilmaz, and S. Uludag, Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks. IEEE Transactions on Dependable and Secure Computing, 18(5) (2021) 2164-2176.

M.S. Ali, M. Vecchio, M. Pincheira, K. Doului, F. Antonelli, and M.H. Rehmani, Applications of Blockchains in the Internet of Things: A comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2) (2018) 1676-1717.

F.H. Pohrmen, R.K. Das, and G. Saha, Blockchain-based security aspects in heterogeneous Internet-of-Things networks: a survey. Transactions on Emerging Telecommunication Technologies, 30 (10) (2019) E3741.

S. Demirci, and S. Sagiroglu, Software defined networking for improved security in smart grid system. 2018 7th International Conference on Renewable Energy Research and Applications, ICRERA, IEEE. (2018) 1021-1026.

U. Ghosh, P. Chatterjee and S. Shetty, Securing SDN-enabled smart power grids: SDN-enabled smart grid security. Cyber-Physical Systems for Next-Generation Networks, IGI Global, (2018) 79-98.

J. Kim, F. Filali, and Y.-B. Ko, Trends and Potentials of the Smart Grid Infrastructure: From ICT Sub-System to SDN-Enabled Smart Grid Architecture. Applied Sciences, 5(4) 706-727.

H. Maziku, S. Shetty, and D.M. Nicol, Security risk assessment for SDN-enabled smart grids. Computer Communications, 133 (2019) 1-11.

D. Ibdah, M. Kanai, N. Lachtar, N. Allan, and B. Al-Duwairi, On the security of SDN-enabled smartgrid systems. 2017 International Conference on Electrical and Computing Technologies and Applications, (ICECTA). Ras Al Khaimah, UAE. (2017) 1-5.

X. Dong, H. Lin, R. Tan, R.K. Iyer and Z. Kalbarczyk, Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges. CPSS ꞌ15: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, (2015) 61-68.

R. Chaudhary, G.S. Aujla, S. Garg, N. Kumar, and J.J.P.C. Rodrigues, SDN-Enabled Multi-Attribute-Based Secure Communication for Smart Grid in IIoT Environment. IEEE Transactions on Industrial Informatics, 14(6) (2018) 2629-2640.

N.E. Petroulakis, K. Fysarakis, I. Askoxylakis, and G. Spanoudakis, Reactive security for SDN/NFV-enabled industrial networks leveraging service function chaining. Transactions on Emerging Telecommunications Technologies, 29(7) (2017).

F. Holik, and P. Dolezel, Industrial Network Protection by SDN-Based IPS with AI. ACIIDS 2020: Intelligent Information and Database Systems. Communications in Computer and Information Science, 1178 (2020) 192-203.

M. Cheminod, L. Durante, L. Seno, F. Valenzano, and C. Zunino, Leveraging SDN to improve security in industrial networks. 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, Norway. (2017) 1-7.

D. Henneke, L. Wisniewski, and J. Jasperneite, Analysis of realizing of future industrial network by means of Software-Defined Networking (SDN). 2016 IEEE World Conference on Factory Communication Systems (WFCS), Aveiro, Portugal. (2016) 1-4.

M. Singh, G.S. Aujla, A. Singh, N. Kumar, and S. Garg, Deep-Learning-Based Blockchain Framework for Secure Software-Defined Industrial Networks. IEEE Transactions on Industrial Informatics, 17(1) (2021) 606-616.

C. Lorenz, D. Hock, J. Scherer, R. Durner, W. Kellerer, S. Gebert, N. Gray, and T. Zineer, An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforccement. IEEE Communications Magazine, 55(3) (2017) 217-223.

R. Alvizu, G. Maier, S. Troia, V.M. Nguyen, and A. Pattavina, SDN-based network orchestration for new dynamic Enterprise Networking services. 2017 19th International Conference on Transparent Optical Networking (ICTON), Girona, Spain. (2017) 1-4.

J. Bailey, and S. Stuart, Faucet: Deploying SDN in the enterprise. Communications of the ACM, 60(1) (2017) 45-49.

D. Levin, M. Canini, S. Schmid, and A. Feldmann, Incremental SDN Deployment in Enterprise Networks. ACM SIGCOMM Computer Communication Review, 43(4) (2013) 473-474.

K. Poularakis, G. Iosifidis, and L. Tassiulas, SDN-Enabled Tactical Ad Hoc Networks: Extending Programmable Control to the Edge. IEEE Communications Magazine, 56(7) (2018) 132-138.

Y. Wei, X. Zhang, L. Xie, and S. Leng, Energy-aware traffic engineering in hybrid SDN/IP backbone networks. Journal of Communications and Networks, 18(4) (2016) 559-566.

B.R. Dawadi, D.B. Rawat, S.R. Joshi, and P. Manzoni. Towards Smart Networking with SDN Enabled IPv6 Network. arXiv preprint, (2022).

E. Seve, J. Pesic, C. Delezoide, A. Giorgetti, A. Sgambelluri, N. Sambo, S. Bigo, and Y. Pointurier, Automated Fibre Type Identification in SDN-Enabled Optical Networks. Journal of Lightwave Technology, 37(7) (2019) 1724-1731.

M. Birk, G. Choudhury, B. Cortez, A. Goddard, N. Padi, A. Raghuram, K. Tse, S. Tse, A. Wallace, and K. Xi, Evolving to an SDN-enabled isp backbone: key technologies and applications. IEEE Communication Magazine, 54(10) (2016) 129-135.

X. Zhang, H. Wang, and H. Zhao, An SDN framework for UAV backbone network towards knowledge centric networking. IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Honolulu. USA, (2018) 456-461.

G. Kakkavas, A. Stamou, V. Karyotis, and S. Papavassiliou, Network Tomography for Efficient Monitoring in SDN-Enabled 5G Networks and Beyond: Challenges and Opportunities. IEEE Communications Magazine, 59(3) (2021) 70-76.

X. Duan, X. Wang, Y. Liu, and K. Zheng, SDN Enabled Dual Cluster Head Selection and Adaptive Clustering in 5G-VANET. 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, Canada, (2016) 1-5.

J. Liu, Y. Shi, L. Zhao, Y. Cao, W. Sun, and N. Kato, Joint Placement of Controllers and Gateways in SDN-Enabled 5G-Satellite Integrated Network. IEEE Journal on Selected Areas in Communications, 36(2) (2018) 221-232.

A.S. Thyagaturu, A. Mercian, M.P. McGarry, M. Reisslein, and W. Kellerer, Software Defined Optical Networks (SDONs): A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 18(4) (2016) 2738-2786.

E. Guler, M. Karakus, and S. Uludag, SpectrumChain: An Efficient Spectrum Management Framework in Blockchain-Enabled Flexible SDON’s. ICC 2022-IEEE International Conference on Communications, Seoul, Republic of Korea. (2022) 5744-5749.




DOI: https://doi.org/10.24071/ijasst.v5i2.6380

Refbacks

  • There are currently no refbacks.









Publisher : Faculty of Science and Technology

Society/Institution : Sanata Dharma University

 

 

 

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.
slot gacor slot