Journal of Computing and Natural Science


An Design of Software Defined Networks and Possibilities of Network Attacks



Journal of Computing and Natural Science

Received On : 30 December 2021

Revised On : 26 March 2022

Accepted On : 28 April 2022

Published On : 05 July 2022

Volume 02, Issue 03

Pages : 088-097


Abstract


This article focusses on a rapidly evolving networking architecture known as Software Defined Networking (SDN) and the possibilities of hazards in the network. This architecture introduces decoupled infrastructure, which establishes customization in the networking system hence making it easy to manage, troubleshoot and configure. This paper focusses on the different aspects of the architecture leaving it an intermediate working in between scholarly application, adding on the elements such as security lapses, security behaviors, general security, programmability and design. In this paper, different points of weakness of the architecture have been evaluates, including the attack vector in every plane. This paper ends with a presentation for futuristic studies on the implications of attacks and potential solutions.


Keywords


Software Defined Networking (SDN), Application Programming Interface (API), Network Virtualization (NV).


  1. A. Gouin, A. Dupas, L. Gifre Renom, A. Benabdallah, F. Boitier, and P. Layec, “Real-time optical transponder prototype with autonegotiation protocol for software defined networks,” J. Opt. Commun. Netw., vol. 13, no. 9, p. 224, 2021.
  2. H. Chen et al., “Research on dynamic load balancing of data center network based on openflow technology,” in 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), 2020.
  3. E. Kemer and R. Samli, “Performance comparison of scalable rest application programming interfaces in different platforms,” Comput. Stand. Interfaces, vol. 66, no. 103355, p. 103355, 2019.
  4. T. F. Oliveira, S. Xavier-de-Souza, and L. F. Silveira, “Improving energy efficiency on SDN control-plane using multi-core controllers,” Energies, vol. 14, no. 11, p. 3161, 2021.
  5. C. Cho, J. Lee, E.-D. Kim, and J.-D. Ryoo, “A sophisticated packet forwarding scheme with deep packet inspection in an OpenFlow switch,” in 2016 International Conference on Software Networking (ICSN), 2016.
  6. R. Ibrahim and W. Whitt, "Real-Time Delay Estimation Based on Delay History in Many-Server Service Systems with Time-Varying Arrivals", Production and Operations Management, vol. 20, no. 5, pp. 654-667, 2010. Doi: 10.1111/j.1937-5956.2010.01196.x.
  7. P. Giocomazzi, L. Musumeci and G. Verticale, "Transport of TCP/IP traffic over assured forwarding IP-differentiated services", IEEE Network, vol. 17, no. 5, pp. 18-28, 2003. Doi: 10.1109/mnet.2003.1233914.
  8. J. Daly, "Social Science Research at the Defense Advanced Research Projects Agency", PS, vol. 13, no. 4, p. 416, 1980. Doi: 10.2307/419045.
  9. "Automated Map Generation for an Intelligent Routing System", International Journal of Science and Research (IJSR), vol. 4, no. 11, pp. 1118- 1121, 2015. Doi: 10.21275/v4i11.nov151380.
  10. H. Alshaer, "An overview of network virtualization and cloud network as a service", International Journal of Network Management, vol. 25, no. 1, pp. 1-30, 2014. Doi: 10.1002/nem.1882.
  11. J. McCoy and D. Rawat, "Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey", Electronics, vol. 8, no. 12, p. 1468, 2019. Doi: 10.3390/electronics8121468.
  12. L. Herrera and O. Maennel, "A comprehensive instrument for identifying critical information infrastructure services", International Journal of Critical Infrastructure Protection, vol. 25, pp. 50-61, 2019. Doi: 10.1016/j.ijcip.2019.02.001.
  13. A. Madureira, F. Araújo and L. Sampaio, "On supporting IoT data aggregation through programmable data planes", Computer Networks, vol. 177, p. 107330, 2020. Doi: 10.1016/j.comnet.2020.107330.
  14. B. Maati and D. Saidouni, "CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacks", Journal of Ambient Intelligence and Humanized Computing, 2020. Doi: 10.1007/s12652-020-02556-0.
  15. Haldorai, A. Ramu, and S. Murugan, “Signal Processing Architectures, Algorithms, and Human–Machine Interactions in Urban Applications,” Computing and Communication Systems in Urban Development, pp. 49–67, 2019. doi:10.1007/978-3-030-26013-2_3
  16. Haldorai, A. Ramu, and S. Murugan, “Artificial Intelligence and Machine Learning for Future Urban Development,” Computing and Communication Systems in Urban Development, pp. 91–113, 2019. doi:10.1007/978-3-030-26013-2_5
  17. Haldorai, A. Ramu, and S. Murugan, “Energy Efficient Network Selection for Urban Cognitive Spectrum Handovers,” Computing and Communication Systems in Urban Development, pp. 115–139, 2019. doi:10.1007/978-3-030-26013-2_6
  18. Haldorai, A. Ramu, and S. Murugan, “Social Relationship Ranking on the Smart Internet,” Computing and Communication Systems in Urban Development, pp. 141–159, 2019. doi:10.1007/978-3-030-26013-2_7
  19. Haldorai, A. Ramu, and S. Murugan, “Cognitive Radio Communication and Applications for Urban Spaces,” Computing and Communication Systems in Urban Development, pp. 161–183, 2019. doi:10.1007/978-3-030-26013-2_8
  20. Haldorai, A., Ramu, A., & Murugan, S. (2019). Machine Learning and Big Data for Smart Generation. Computing and Communication Systems in Urban Development, 185–203. doi:10.1007/978-3-030-26013-2_9.
  21. Haldorai, A. Ramu, and S. Murugan, “Smart Sensor Networking and Green Technologies in Urban Areas,” Computing and Communication Systems in Urban Development, pp. 205–224, 2019. doi:10.1007/978-3-030-26013-2_10
  22. G. Gokilakrishnan, S. Ganeshkumar, H. Anandakumar and M. Vigneshkumar, "A Critical Review of Production Distribution Planning Models," 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), 2021, pp. 2047-2051, doi: 10.1109/ICACCS51430.2021.9441879.
  23. S. Murugan and A. Haldorai, “Role of Machine Intelligence and Big Data in Remote Sensing,” Advances in Data Mining and Database Management, pp. 118–130, 2019.

Acknowledgements


Authors thank Reviewers for taking the time and effort necessary to review the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Anandakumar Haldorai, Shrinand Anandakumar, “An Design of Software Defined Networks and Possibilities of Network Attacks", vol.2, no.3, pp. 088-097, July 2022. doi: 10.53759/181X/JCNS202202012.


Copyright


© 2022 Anandakumar Haldorai, Shrinand Anandakumar. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.