Another technique for building and tracking networks has been created by software-defined networking (SDN), but it has also updated the assault surface formed by the organization.SDN offers numerous designs that permit straightforward moderation of particular sorts of assaults, for example, DoS, and permit further work to alleviate certain assaults. In any case, SDN regularly presents new imperfections that are absent in customary organizations, for example, a nonappearance of correspondence between the control plane and the information plane. A few new advancements and strategies have been recommended to conquer shortcomings in SDN security and some extra work may likewise be applied to fix them. Current SDN work explores many measurable patterns that contribute to the state of SDN technology implementation. Because Open Flow is SDN’s most common implementation is currently being used in production environments, and IOT of research has been done to use and develop the protocol. There is anyway another exploration pattern that has work that is for the most part pertinent to SDN, including designs that give more adaptability than Open Flow. The expected study will probably follow these patterns by enhancing Open Flow protocol and suggesting more general alternatives, and this research will include further development of network design testing tools and research into Open Flow enhancements when used in production environments. This work presents a study survey review of current SDN security research and other work done in the field of SDNs that is relevant to security and a forecast of future SDN security research directions.
Liu, Y., Kuang, Y., Xiao, Y., & Xu, G. (2017). SDN-based data transfer security for Internet of Things. IEEE Internet of Things Journal, 5(1), 257-268.
Mukhanov, A., Petukhov, A., &Pilugin, P. (2018, October). “Common Criteria” and Software-Defined Network (SDN) Security. In 2018 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC) (pp. 1-6). IEEE.
Byun, M., Lee, Y., & Choi, J. Y. (2019, February). Risk and avoidance strategy for blocking mechanism of SDN-based security service. In 2019 21st International Conference on Advanced Communication Technology (ICACT) (pp. 187-190). IEEE.
Varadharajan, V., Karmakar, K., Tupakula, U., & Hitchens, M. (2018). A policy-based security architecture for software-defined networks. IEEE Transactions on Information Forensics and Security, 14(4), 897-912.
Zheng, S. (2019, May). Research on SDN-based IoT Security Architecture Model. In 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) (pp. 575-579). IEEE.
Midha, S., &Triptahi, K. (2019, January). Extended TLS security and Defensive Algorithm in OpenFlow SDN. In 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (pp. 141-146). IEEE.
Abdou, A., Van Oorschot, P. C., & Wan, T. (2018). Comparative analysis of control plane security of SDN and conventional networks. IEEE Communications Surveys & Tutorials, 20(4), 3542-3559.
Fawcett, L., Scott-Hayward, S., Broadbent, M., Wright, A., & Race, N. (2018). Tennison: a distributed SDN framework for scalable network security. IEEE Journal on Selected Areas in Communications, 36(12), 2805-2818.
Al-Alaj, A., Krishnan, R., & Sandhu, R. (2019, October). SDN-RBAC: An Access Control Model for SDN Controller Applications. In 2019 4th International Conference on Computing, Communications, and Security (ICCCS) (pp. 1-8). IEEE.
Nikoue, J. C., Butakov, S., & Malik, Y. (2019, January). Security Evaluation Methodology for Software Defined Network Solutions. In 2019 International Conference on Platform Technology and Service (PlatCon) (pp. 1-6). IEEE.
Duan, Q., Ansari, N., & Toy, M. (2016). Software-defined network virtualization: An architectural framework for integrating SDN and NFV for service provisioning in future networks. IEEE Network, 30(5), 10-16.
Braun, W., &Menth, M. (2014). Software-defined networking using OpenFlow: Protocols, applications, and architectural design choices. Future Internet, 6(2), 302-336.
Smyth, D., McSweeney, S., O\"Shea, D., &Cionca, V. (2017, July). Detecting link fabrication attacks in software-defined networks. In 2017 26th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-8). IEEE.
Ramaswamy, V. (2017, July). Quantifying the Scalability of Software Defined Networks with Dynamic Topology. In 2017 26th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-7). IEEE.
S. A. Mehdi, J. Khalid, and S. A. Khayam. Revisiting Traffic Anomaly Detection using Software Defined Networking. Recent Advances in Intrusion Detection (RAID), pages 1–20, 2011
Bakshi, K. (2013, March). Considerations for software-defined networking (SDN): Approaches and use cases. In 2013 IEEE Aerospace Conference (pp. 1-9). IEEE.
Alhanani, R. A., &Abouchabaka, J. (2014, November). An overview of different techniques and algorithms for network topology discovery. In 2014 Second World Conference on Complex Systems (WCCS) (pp. 530-535). IEEE.
Liu, F., & Li, T. (2018). A clustering-anonymity privacy-preserving method for wearable IoT devices. Security and Communication Networks, 2018.
Tarnaras, G., Haleplidis, E., &Denazis, S. (2015, April). SDN and ForCES based optimal network topology discovery. In Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) (pp. 1-6). IEEE.
Pakzad, F., Portmann, M., Tan, W. L., &Indulska, J. (2014, December). Efficient topology discovery in software-defined networks. In 2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS) (pp. 1-8). IEEE.
Khan, S., Gani, A., Wahab, A. W. A., Guizani, M., & Khan, M. K. (2016). Topology discovery in software-defined networks: Threats, taxonomy, and state-of-the-art. IEEE Communications Surveys & Tutorials, 19(1), 303-324.
Zhang, H., Cai, Z., Liu, Q., Xiao, Q., Li, Y., &Cheang, C. F. (2018). A survey on security-aware measurement in SDN. Security and Communication Networks, 2018.
Software design networking, SDN security, Security evaluation, control plane, open-flow.