Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security challenges and opportunities of software-defined networking
Dacier M., König H., Cwalinski R., Kargl F., Dietrich S. IEEE Security and Privacy15 (2):96-100,2017.Type:Article
Date Reviewed: Aug 3 2018

Software-defined networking (SDN) is becoming a new paradigm for computer networks, gaining popularity in industry and academia alike. While SDN introduces new capabilities to traditional networking, it also adds complexity. Among many other capabilities that SDN provides to traditional networks, it makes tracking and detecting network attacks much easier via a centralized controller. However, the presence of a centralized controller also leads to a single point of failure in the network, which attackers can exploit to bring down the network, thus making the network vulnerable.

This paper summarizes a Dagstuhl seminar, held in September 2016, regarding the positives and negatives of SDN with regard to network security. It presents some significant outcomes related to SDN and its effect on network security. It also briefly reviews research directions to achieve secure SDN architectures and configurations. To get a complete picture of the discussions--and the outcomes of those discussions--one must go through the Dagstuhl Reports issue [1], which consists of papers on SDN and network security by seminar participants. Both Dacier et al.’s paper and [1] present expert opinions regarding SDN and its effect on network security.

It is interesting to read the points made by experienced participants from industry and academia, both in favor and against SDN. This paper and the related report [1] are highly recommended for anyone interested in SDN. It is important to know how SDN can improve network security while at the same time making the network vulnerable, as well as research directions to improve SDN and thus attain secure and efficient networks.

Reviewer:  Rinki Sharma Review #: CR146184 (1811-0567)
1) Dagstuhl Reports 6, 9 (Sep. 2016), http://drops.dagstuhl.de/opus/volltexte/dagrep-complete/2016/dagrep-v006-i009-complete.pdf.
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy