Journal of Machine and Computing


An Analysis of Software Defined Networks and Possibilities of Network Attacks



Journal of Machine and Computing

Received On : 14 December 2021

Revised On : 28 December 2021

Accepted On : 30 December 2021

Published On : 05 January 2022

Volume 02, Issue 01

Pages : 042-052


Abstract


This article focusses on a rapidly evolving networking architecture known as Software Defined Networking (SDN) and the possibilities of hazards in the network. This architecture introduces decoupled infrastructure, which establishes customization in the networking system hence making it easy to manage, troubleshoot and configure. This paper focusses on the different aspects of the architecture leaving it an intermediate working in between scholarly application, adding on the elements such as security lapses, security behaviors, general security, programmability and design. In this paper, different points of weakness of the architecture have been evaluates, including the attack vector in every plane. This paper ends with a presentation for futuristic studies on the implications of attacks and potential solutions.


Keywords


Software Defined Networking (SDN), Application Programming Interface (API), Network Virtualization (NV)


  1. A. Gouin, A. Dupas, L. Gifre Renom, A. Benabdallah, F. Boitier, and P. Layec, “Real-time optical transponder prototype with autonegotiation protocol for software defined networks,” J. Opt. Commun. Netw., vol. 13, no. 9, p. 224, 2021.
  2. H. Chen et al., “Research on dynamic load balancing of data center network based on openflow technology,” in 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), 2020.
  3. E. Kemer and R. Samli, “Performance comparison of scalable rest application programming interfaces in different platforms,” Comput. Stand. Interfaces, vol. 66, no. 103355, p. 103355, 2019.
  4. T. F. Oliveira, S. Xavier-de-Souza, and L. F. Silveira, “Improving energy efficiency on SDN control-plane using multi-core controllers,” Energies, vol. 14, no. 11, p. 3161, 2021.
  5. C. Cho, J. Lee, E.-D. Kim, and J.-D. Ryoo, “A sophisticated packet forwarding scheme with deep packet inspection in an OpenFlow switch,” in 2016 International Conference on Software Networking (ICSN), 2016.
  6. R. Ibrahim and W. Whitt, "Real-Time Delay Estimation Based on Delay History in Many-Server Service Systems with Time-Varying Arrivals", Production and Operations Management, vol. 20, no. 5, pp. 654-667, 2010. Doi: 10.1111/j.1937-5956.2010.01196.x.
  7. P. Giocomazzi, L. Musumeci and G. Verticale, "Transport of TCP/IP traffic over assured forwarding IP-differentiated services", IEEE Network, vol. 17, no. 5, pp. 18-28, 2003. Doi: 10.1109/mnet.2003.1233914.
  8. J. Daly, "Social Science Research at the Defense Advanced Research Projects Agency", PS, vol. 13, no. 4, p. 416, 1980. Doi: 10.2307/419045.
  9. H. Alshaer, "An overview of network virtualization and cloud network as a service", International Journal of Network Management, vol. 25, no. 1, pp. 1-30, 2014. Doi: 10.1002/nem.1882.
  10. J. McCoy and D. Rawat, "Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey", Electronics, vol. 8, no. 12, p. 1468, 2019. Doi: 10.3390/electronics8121468.
  11. L. Herrera and O. Maennel, "A comprehensive instrument for identifying critical information infrastructure services", International Journal of Critical Infrastructure Protection, vol. 25, pp. 50-61, 2019. Doi: 10.1016/j.ijcip.2019.02.001.
  12. A. Madureira, F. Araújo and L. Sampaio, "On supporting IoT data aggregation through programmable data planes", Computer Networks, vol. 177, p. 107330, 2020. Doi: 10.1016/j.comnet.2020.107330.
  13. B. Maati and D. Saidouni, "CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacks", Journal of Ambient Intelligence and Humanized Computing, 2020. Doi: 10.1007/s12652-020-02556-0.
  14. Haldorai and U. Kandaswamy, “Intelligent Cognitive Radio Communications: A Detailed Approach,” EAI/Springer Innovations in Communication and Computing, pp. 19–40, 2019. doi:10.1007/978-3-030-15416-5_2
  15. Haldorai and U. Kandaswamy, “Energy Efficient Network Selection for Cognitive Spectrum Handovers,” EAI/Springer Innovations in Communication and Computing, pp. 41–64, 2019. doi:10.1007/978-3-030-15416-5_3
  16. Haldorai and U. Kandaswamy, “Software Radio Architecture: A Mathematical Perspective,” EAI/Springer Innovations in Communication and Computing, pp. 65–86, 2019. doi:10.1007/978-3-030-15416-5_4
  17. Haldorai and U. Kandaswamy, “Distributed Algorithms for Learning and Cognitive Medium,” EAI/Springer Innovations in Communication and Computing, pp. 87–109, 2019. doi:10.1007/978-3-030-15416-5_5
  18. Haldorai and U. Kandaswamy, “Green Wireless Communications Via Cognitive Handover,” EAI/Springer Innovations in Communication and Computing, pp. 155–174, 2019. doi:10.1007/978-3-030-15416-5_8
  19. Haldorai and U. Kandaswamy, “Secure Distributed Spectrum Sensing in Cognitive Radio Networks,” EAI/Springer Innovations in Communication and Computing, pp. 175–191, 2019. doi:10.1007/978-3-030-15416-5_9
  20. Haldorai and U. Kandaswamy, “Applications and Services of Intelligent Spectrum Handover,” EAI/Springer Innovations in Communication and Computing, pp. 193–210, 2019. doi:10.1007/978-3-030-15416-5_10
  21. R. Arulmurugan, K. R. Sabarmathi, and H. Anandakumar, “Classification of sentence level sentiment analysis using cloud machine learning techniques,” Cluster Computing, vol. 22, no. S1, pp. 1199–1209, Sep. 2017.
  22. Haldorai and U. Kandaswamy, “Cooperative Spectrum Handovers in Cognitive Radio Networks,” EAI/Springer Innovations in Communication and Computing, pp. 1–18, 2019. doi:10.1007/978-3-030-15416-5_1
  23. Haldorai, A. Ramu, and S. Murugan, “Signal Processing Architectures, Algorithms, and Human–Machine Interactions in Urban Applications,” Computing and Communication Systems in Urban Development, pp. 49–67, 2019. doi:10.1007/978-3-030-26013-2_3
  24. Haldorai, A. Ramu, and S. Murugan, “Artificial Intelligence and Machine Learning for Future Urban Development,” Computing and Communication Systems in Urban Development, pp. 91–113, 2019. doi:10.1007/978-3-030-26013-2_5
  25. Haldorai, A. Ramu, and S. Murugan, “Biomedical Informatics and Computation in Urban E-health,” Computing and Communication Systems in Urban Development, pp. 69–89, 2019. doi:10.1007/978-3-030-26013-2_4
  26. Haldorai, A. Ramu, and S. Murugan, “Energy Efficient Network Selection for Urban Cognitive Spectrum Handovers,” Computing and Communication Systems in Urban Development, pp. 115–139, 2019. doi:10.1007/978-3-030-26013-2_6
  27. Haldorai, A. Ramu, and S. Murugan, “Social Relationship Ranking on the Smart Internet,” Computing and Communication Systems in Urban Development, pp. 141–159, 2019. doi:10.1007/978-3-030-26013-2_7
  28. Haldorai, A. Ramu, and S. Murugan, “Cognitive Radio Communication and Applications for Urban Spaces,” Computing and Communication Systems in Urban Development, pp. 161–183, 2019. doi:10.1007/978-3-030-26013-2_8
  29. Haldorai, A. Ramu, and S. Murugan, “Smart Sensor Networking and Green Technologies in Urban Areas,” Computing and Communication Systems in Urban Development, pp. 205–224, 2019. doi:10.1007/978-3-030-26013-2_10
  30. Haldorai, A. Ramu, and S. Murugan, “Social Aware Cognitive Radio Networks,” Social Network Analytics for Contemporary Business Organizations, pp. 188–202. doi:10.4018/978-1-5225-5097-6.ch010
  31. M. Suganya and H. Anandakumar, “Handover based spectrum allocation in cognitive radio networks,” 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), Dec. 2013.doi:10.1109/icgce.2013.6823431. doi:10.4018/978-1-5225-5246-8.ch012
  32. S, D., & H, A. (2019). AODV Route Discovery and Route Maintenance in MANETs. 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS). doi:10.1109/icaccs.2019.8728456
  33. H. Anandakumar and K. Umamaheswari, “An Efficient Optimized Handover in Cognitive Radio Networks using Cooperative Spectrum Sensing,” Intelligent Automation & Soft Computing, pp. 1–8, Sep. 2017. doi:10.1080/10798587.2017.1364931
  34. Haldorai, A. Ramu, and S. Murugan, “Social Aware Cognitive Radio Networks,” Social Network Analytics for Contemporary Business Organizations, pp. 188–202. doi:10.4018/978-1-5225-5097-6.ch010
  35. Haldorai and U. Kandaswamy, “Cooperative Spectrum Handovers in Cognitive Radio Networks,” EAI/Springer Innovations in Communication and Computing, pp. 1–18, 2019. doi:10.1007/978-3-030-15416-5_1

Acknowledgements


Authors thanks to Department of Computer Science and Engineering for this research support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Anandakumar Haldorai, Karthikeyan K, “An Analysis of Software Defined Networks and Possibilities of Network Attacks”, Journal of Machine and Computing, vol.2, no.1, pp. 042-052, January 2022. doi: 10.53759/7669/jmc202202006.


Copyright


© 2022 Anandakumar Haldorai, Karthikeyan K. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.