ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
Software Defined Network (SDN) paradigm provides intelligent and efficient management of different network control functions (NF) depending on changes in traffic behavior, service providers’ requirements and application context. However, the logical centralization of controllers’ functions opens up challenges towards enforcing security perimeter over the underlying network and the assets involved. In this paper, we propose a risk assessment model for pro-active secure flow control and routing of traffic in SDN. The proposed model determines threat value of different SDN entities by analyzing vulnerability and exposure with respect to Common Vulnerability Scoring System (CVSS). The risk of a given traffic is calculated as cumulative threat values of the SDN entities that guides the flow and routing control functions in generating secure flow rules for the forwarding switches. The efficacy of the proposed model is demonstrated through extensive case studies of an enterprise network.
Conclusion
The Software Defined Network (SDN) paradigm might suffer from various security threats due to its inherent characteristics such as open user-control, ubiquitous execution of network functions and centralized control management. In this paper, a risk assessment model is proposed where the core component, i.e., the Risk Analyze function analyzes the risk of a specific traffic request based on the threat models of related SDN entities. Then, these risk values are communicated to flow and routing control function for generating secure flow rules with no or minimal risk. The proposed security solution enables a pro-active end-toend security assessment of the traffic requests and accordingly ensures a secure flow and routing process. The efficacy of our proposed functions has been evaluated through a case study of an enterprise network and the results have been reported. In future, the proposed security mechanism will be enhanced with appropriate sensitivity analysis to find out the potential sources of the vulnerabilities. In addition, the security functions will be verified with varying requirements and context.