Software-Defined Networking (SDN)

Software-defined networking (SDN) and Network Function Virtualization (NFV) have revolutionized the way networks are designed, built, and operated. This paper presents how an SDN system, Office Without a Cool Acronym (OWCA), was designed and implemented to build an enterprise network that is secure, testable, and automates all aspects of managing networking devices. OWCA requires explicit authorization before forwarding a packet from a source to a destination, ensuring that only authorized traffic is allowed on the network. It is intent-driven and modeling based.

Categories:
16 Views

In the contemporary cybersecurity landscape, robust attack detection mechanisms are important for organizations. However, the current state of research in Software-Defined Networking (SDN) suffers from a notable lack of recent SDN-OpenFlow-based datasets. Here we introduce a novel dataset for intrusion detection in Software-Defined Networking named SDNFlow. The dataset, derived from OpenFlow statistics gathered from real traffic, integrates a comprehensive range of network activities.

Categories:
1307 Views

Neighbourhood area networks (NANs) lay the foundation for robust communication in smart grids to support stable and secure end-user connectivity with substations. Firstly, the current solutions are unrealistic to meet the time-bound requirements for smart grid applications with large number of intermediate node connectivity in NANs. Secondly, the existing Low-power Wireless Personal Area Network (LoWPAN) do not scale up to thousand nodes while meeting the latency requirement of delay-critical smart grid applications.

Categories:
32 Views

It is now widely known fact that the Cloud computing and Software defined network paradigms have received a wide acceptance from researchers, academia and the industry. But the wider acceptance of cloud computing and SDN paradigms are hampered by increasing security threats. One of the several facts is that the advancements in processing facilities currently available are implicitly helping the attackers to attack in various directions. For example, it is visible that the conventional DoS attacks are now extended to cloud environments as DDoS attacks.

Categories:
3734 Views

The rise of the Internet of Things (IoT) has opened new research lines that focus on applying IoT applications to domains further beyond basic user-grade applications, such as Industry or Healthcare. These domains demand a very high Quality of Service (QoS), mainly a very short response time. In order to meet these demands, some works are evaluating how to modularize and deploy IoT applications in different nodes of the infrastructure (edge, fog, cloud), as well as how to place the network controllers, since these decisions affect the response time of the application.

Categories:
806 Views