Double layer controller for distributed software defined network in mitigating cyber attacks.

التفاصيل البيبلوغرافية
العنوان: Double layer controller for distributed software defined network in mitigating cyber attacks.
المؤلفون: Wong, Man Yee, Yaakob, Naimah, Beson, M. Rashidi Che, Ahmad, R. Badlishah, Md Enzai, Nur Idawati
المصدر: AIP Conference Proceedings; 2024, Vol. 2898 Issue 1, p1-10, 10p
مصطلحات موضوعية: CYBERTERRORISM, SOFTWARE-defined networking, COMPUTER network security, INFORMATION networks, MODEL airplanes
مستخلص: Many traditional network encryption models are ill-suited for integration within Software Defined Networks (SDNs) due to their detachment from the control plane and their distinct programmable attributes. An SDN, functioning as a software component on a server, furnishes essential resources and intelligence for managing data plane programming within a network context. However, the adoption of SDNs brings forth challenges, such as concerns regarding scalability and reliability within centralized architectures. To counter these, the control plane's physical decentralization is contemplated, though this approach introduces its own set of complexities. This paper introduces a novel solution in the form of a double layer controller aimed at enhancing SDN security. The approach encompasses performance assessment metrics like packet loss, latency, bit rate, and network congestion. Notably, vulnerabilities arise from the potential remote manipulation of switch configurations to connect with an OpenFlow-capable controller. Acknowledging the limitations of existing methods, especially their inability to accommodate large-scale networks, the proposed technique leverages a double layer controller and employs multi-flow state dynamics to gather core network status information before conveying it to users. This approach not only enhances resilience and dependability compared to prior methodologies but also triggers alerts in response to unhealthy network metrics, thereby elevating accuracy and fortifying network security. [ABSTRACT FROM AUTHOR]
Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:0094243X
DOI:10.1063/5.0194611