Visible to the public An efficient modular security plane AM-SecP for hybrid distributed SDN

TitleAn efficient modular security plane AM-SecP for hybrid distributed SDN
Publication TypeConference Paper
Year of Publication2019
AuthorsZkik, Karim, Sebbar, Anass, Baadi, Youssef, Belhadi, Amine, Boulmalf, Mohammed
Conference Name2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
ISBN Number978-1-7281-3316-4
KeywordsAM-SecP, centralized network architecture, centralized security layer, Computer architecture, Computer crime, computer network security, Conferences, control planes, data plane, denying services, detecting intrusions, Distributed Systems, DoS/DDoS, efficient modular security plane AM-SecP, end user layer, Firewalls (computing), Flexibility, Forensics, hybrid distributed SDN, Internet, Internet service providers, invasive software, malwares, mobile operators, pubcrawl, resilience, Resiliency, Scalability, SDN, SDN layers which ease packets inspections, SDN security, SDN's security issues, SDNs, security, security of data, Servers, software defined networking, technical challenges, telecommunication traffic
Abstract

Software defined networks (SDNs) represent new centralized network architecture that facilitates the deployment of services, applications and policies from the upper layers, relatively the management and control planes to the lower layers the data plane and the end user layer. SDNs give several advantages in terms of agility and flexibility, especially for mobile operators and for internet service providers. However, the implementation of these types of networks faces several technical challenges and security issues. In this paper we will focus on SDN's security issues and we will propose the implementation of a centralized security layer named AM-SecP. The proposed layer is linked vertically to all SDN layers which ease packets inspections and detecting intrusions. The purpose of this architecture is to stop and to detect malware infections, we do this by denying services and tunneling attacks without encumbering the networks by expensive operations and high calculation cost. The implementation of the proposed framework will be also made to demonstrate his feasibility and robustness.

URLhttps://ieeexplore.ieee.org/document/8923557
DOI10.1109/WiMOB.2019.8923557
Citation Keyzkik_efficient_2019