Security Framework Based on SDN

Article Preview

Abstract:

With the growing demand for information, it has a strategic importance for the future of sustainable development how to create a safe and robust network system to ensure the security of important information. Intrusion detection technology can proactively react against intrusion behavior and adjust its strategies in time. So it provides an effective means for network security to minimize or avoid loss when network system is attacked. It is an important part of network security system. This article first explains the current framework and the working principle of SDN. Then it explains the existing security threats of current framework. Next intrusion detection system based on SDN is proposed after the introduction of the intrusion detection system. And we made experiments to verify it. Finally we analyze the lack of the structure and propose some improvements.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4690-4693

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Qiu Xiaofeng, Zhao Liang, Gao Teng, VSA and SDS: A research of two kinds of network security architecture based on SDN [J], JOURNAL OF CHINESE COMPUTER SYSTEMS, 2013, 34 (10).

Google Scholar

[2] Open Networking Foundation. Software-defined networking: the new norm for networks[R]. ONF White Paper, April 13, (2012).

Google Scholar

[3] Chung-Shen, Liao Li, Wan Jiun. Software defined networks[J]. Communications Magazine, IEEE, 2013, 51(2): 113.

Google Scholar

[4] Zuo Qing-yun, Chen Ming, Zhao Guang-song, et al. OpenFlowbased SDN technologies[J]. Journal of Software, 2013, 3(29): 1078-1097.

Google Scholar

[5] Shin S, Gu Guo-fei. CloudWatcher: network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)[C]. 20th International Conference on Network Protocols (ICNP), 2012: 1-6.

DOI: 10.1109/icnp.2012.6459946

Google Scholar