СЛУЖБИ БЕЗПЕКИ SDN
Анотація
Software-Defined Networking Security Services
We will discuss the limitations of existing systems and presents a possible SDN-based system to assert network resources by controlling unsafe and doubtful network traffic. We consider the main vulnerabilities of Software Defined Networks such as limitation inheritance and do some research of ways of solution those problems.
Посилання
Recommendation ITU-T Y.3300, “Framework of Software-Defined Networking,” ITU-T, Jun. 2014.
J. Jeong, H. Kim, and J. Park, “Requirements for Security Services based on Software-Defined Networking,” IETF draft-jeong-i2nsf-sdnsecurity-services-02, Jul. 2015.
R. Enns, M. Bjorklund, J. Schoenwaelder, and A. Bierman, “Network Configuration Protocol (NETCONF),” IETF RFC 6241, Jun. 2011.
Open Networking Foundation, “SDN Architecture,” ONF, Jun. 2014.
H. Kim and N. Feamster, “Improving Network Management with Software Defined Networking,” IEEE Communications Magazine, vol. 51, no. 2, pp. 114–119, Feb. 2013.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2017 Тарас Олексійович Сікач
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.