期刊文献+

From CIA to PDR:A Top-Down Survey of SDN Security for Cloud DCN

From CIA to PDR:A Top-Down Survey of SDN Security for Cloud DCN
下载PDF
导出
摘要 By extracting the control plane from the data plane, SDN en?ables unprecedented flexibility for future network architec?tures and quickly changes the landscape of the networking industry. Although the maturity of commonly accepted SDN security practices is the key to the proliferation of cloud DCN, SDN security research is still in its infancy. This pa?per gives a top?down survey of the approaches in this area, discussing security challenges and opportunities of software?defined datacenter networking for cloud computing. It lever?ages the well?known confidentiality?integrity?availability (CIA) matrix and protection?detection?reaction (PDR) model to give an overview of current security threats and security mea?sures. It also discusses promising research directions in this field. By extracting the control plane from the data plane, SDN en?ables unprecedented flexibility for future network architec?tures and quickly changes the landscape of the networking industry. Although the maturity of commonly accepted SDN security practices is the key to the proliferation of cloud DCN, SDN security research is still in its infancy. This pa?per gives a top?down survey of the approaches in this area, discussing security challenges and opportunities of software?defined datacenter networking for cloud computing. It lever?ages the well?known confidentiality?integrity?availability (CIA) matrix and protection?detection?reaction (PDR) model to give an overview of current security threats and security mea?sures. It also discusses promising research directions in this field.
出处 《ZTE Communications》 2016年第1期54-60,共7页 中兴通讯技术(英文版)
关键词 SDN security cloud DCN CIA PDR SDN security cloud DCN CIA PDR
  • 相关文献

参考文献47

  • 1U.S.Government Publishing Office.Public Printing and Documents-Coordination of Federal Information Policy-Information Security-Definitions. http://www.gpo.gov/fdsys/granule/USCODE-2011-title44/USCODE-2011-title44-chap35-subchap III-sec3542/content-detail.html .
  • 2Izzat Alsmadi,Dianxiang Xu.??Security of Software Defined Networks: A survey(J)Computers & Security . 2015
  • 3Chi-Yao Hong,Srikanth Kandula,Ratul Mahajan,Ming Zhang,Vijay Gill,Mohan Nanduri,Roger Wattenhofer.??Achieving high utilization with software-driven WAN(J)ACM SIGCOMM Computer Communication Review . 2013 (4)
  • 4Sushant Jain,Alok Kumar,Subhasree Mandal,Joon Ong,Leon Poutievski,Arjun Singh,Subbaiah Venkata,Jim Wanderer,Junlan Zhou,Min Zhu,Jon Zolla,Urs H?lzle,Stephen Stuart,Amin Vahdat.??B4(J)ACM SIGCOMM Computer Communication Review . 2013 (4)
  • 5Zafar Ayyub Qazi,Cheng-Chun Tu,Luis Chiang,Rui Miao,Vyas Sekar,Minlan Yu.??SIMPLE-fying middlebox policy enforcement using SDN(J)ACM SIGCOMM Computer Communication Review . 2013 (4)
  • 6Nate Foster,Rob Harrison,Michael J. Freedman,Christopher Monsanto,Jennifer Rexford,Alec Story,David Walker.??Frenetic(J)ACM SIGPLAN Notices . 2011 (9)
  • 7Jayaram Mudigonda,Praveen Yalagandula,Jeff Mogul,Bryan Stiekes,Yanick Pouffary.??NetLord(J)ACM SIGCOMM Computer Communication Review . 2011 (4)
  • 8Balajee Vamanan,Gwendolyn Voskuilen,T. N. Vijaykumar.??EffiCuts(J)ACM SIGCOMM Computer Communication Review . 2010 (4)
  • 9T.Koponen,K.Amidon,P.Balland,et al.'Network virtualization in multi-tenant datacenters '. Proc.11th USENIX Symposium on Networked Systems Design and Implementation . 2014
  • 10Akamai.Q2 2015 State of the Internet—Security Report. https://www.stateoftheinternet.com/resources-cloud-security-2015-q2-web-security-report.html .

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部