Visible to the public Security Evaluation Methodology for Software Defined Network Solutions

TitleSecurity Evaluation Methodology for Software Defined Network Solutions
Publication TypeConference Paper
Year of Publication2019
AuthorsNikoue, Jean Claude, Butakov, Sergey, Malik, Yasir
Conference Name2019 International Conference on Platform Technology and Service (PlatCon)
Date Publishedjan
ISBN Number978-1-7281-1288-6
Keywordsauthentication, comprehensive methodology, computer network security, computer networking, control systems, cryptography, NIST 800-53, Object recognition, Organizations, pubcrawl, resilience, Resiliency, Scalability, SDN architecture, SDN choice, SDN controllers, SDN security, SDN solutions, security assessment, security controls, security evaluation, security evaluation methodology, security-related features, software defined network solutions, software defined networking, software-defined networking
Abstract

Software Defined Networking (SDN) has introduced both innovative opportunities and additional risks in the computer networking. Among disadvantages of SDNs one can mention their susceptibility to vulnerabilities associated with both virtualization and the traditional networking. Selecting a proper controller for an organization may not be a trivial task as there is a variety of SDN controllers on the market and each of them may come with its own pros and cons from the security point of view. This research proposes a comprehensive methodology for organizations to evaluate security-related features available in SDN controllers. The methodology can serve as a guideline in the decisions related to SDN choice. The proposed security assessment follows a structured approach to evaluate each layer of the SDN architecture and each metrics defined in presented research has been matched with the security controls defined in NIST 800-53. Through the tests on actual controllers the paper provides an example on how the proposed methodology can be used to evaluate existing SDN solutions.

URLhttps://ieeexplore.ieee.org/document/8669405
DOI10.1109/PlatCon.2019.8669405
Citation Keynikoue_security_2019