Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Software-defined network forensics: motivation, potential locations, requirements, and challenges
Khan S., Gani A., Wahab A., Abdelaziz A., Ko K., Khan M., Guizani M. IEEE Network: The Magazine of Global Internetworking30 (6):6-13,2016.Type:Article
Date Reviewed: Aug 2 2018

Over the years, network traffic has increased exponentially, and will continue to increase in the future. New network technologies are required to deal with the expanding network traffic and infrastructure. A software-defined network (SDN) is one such technology that allows efficient network management and configuration. Unlike traditional network architectures, SDN disassociates the data plane (the part of the network involved with packet forwarding) and the control plane (the part of the network involved with decision making) to attain more flexibility and easy troubleshooting. SDN centralizes network intelligence to the network controller for easy network configuration and management.

The network controller has an overall view of the network. It can track malicious traffic flows and suspicious attempts to gain network access. However, centralized network control also makes the network vulnerable to attacks--all an attacker has to do is attack the network controller to bring down the network. While a SDN architecture helps in tracing network attacks more efficiently when compared to a traditional network architecture, it is also more vulnerable to security attacks due to its centralized architecture.

Investigating security attacks in SDN is a complex task, and this is where SDN forensics plays an important role. This paper discusses the possibility of tracing SDN attacks at different SDN layers. The authors briefly discuss the difference between traditional network forensics and SDN forensics, as well as the need for the latter. Evidence collection at the application, control, and infrastructure layers of SDN is discussed in detail. The paper briefly discusses different stages of evidence collection, analysis, and reporting. The authors also propose a generalized model for SDN forensics.

This paper provides structured insight into SDN forensics. It will be useful for network security researchers and personnel.

Reviewer:  Rinki Sharma Review #: CR146182 (1811-0569)
Bookmark and Share
  Reviewer Selected
 
 
Internet (C.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Internet": Date
The whole Internet user’s guide and catalog
Krol E., O’Reilly & Associates, Inc., Sebastopol, CA, 1992. Type: Book (9781565920255)
Mar 1 1993
Exploring the Internet
Malamud C., Prentice-Hall, Inc., Upper Saddle River, NJ, 1992. Type: Book (9780132968980)
Oct 1 1993
The Internet message
Rose M. (ed), Prentice-Hall, Inc., Upper Saddle River, NJ, 1993. Type: Book (9780130929419)
Jan 1 1995
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy