Skip navigation
Please use this identifier to cite or link to this item: https://repository.esi-sba.dz/jspui/handle/123456789/308
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMEGUITIF, M’Hamed-
dc.contributor.authorBOUZROURA, RAmzi-
dc.date.accessioned2022-11-08T08:47:47Z-
dc.date.available2022-11-08T08:47:47Z-
dc.date.issued2022-
dc.identifier.urihttps://repository.esi-sba.dz/jspui/handle/123456789/308-
dc.descriptionEncadreur Mr Alaa Eddine BELFEDHALen_US
dc.description.abstractSoftware-DeĄned Networking continues to grow in popularity because It allows more effective network administration and provides additional functionalities like programmability, elasticity, and Ćexibility which are things difficult to think of in a classic inĆexible network architecture. All that is achieved Mostly due to the separation of the centralized controller from the forwarding devices. Security in SDN, on the other hand, is a complicated issue, SDN has changed the attack surface that is presented by networks because it inherits vulnerabilities from traditional networks via shared protocols while also introducing new security Ćaws and weaknesses. Many new technologies and techniques have been presented to overcome SDN security Ćaws, and more work can be done to address them as well. In this paper, we will examine and explain the vulnerabilities that inĆuence SDN, categorizing them into two categories. the Ąrst one are vulnerabilities caused by the use of the traditional network protocols and the other type are new security Ćaws caused by the SDN implementation. In our work, we try to take advantage of the SDN visibility and its programmability capabilities to construct ŤFCMŤ (Flow ConĆict Manager), a solution that helps to detect and resolve Ćow rule conĆicts in an SDN-based network.*** Le r´eseau d´eĄni par logiciel (SDN) continue de gagner en popularit´e car il permet une administration r´eseau plus efficace et fournit des fonctionnalit´es suppl´ementaires telles que la programmabilit´e, lŠ´elasticit´e et la Ćexibilit´e qui sont des choses difficiles ‘a imaginer dans une architecture r´eseau classique inĆexible. Tout cela est r´ealis´e principalement grˆace ‘a la s´eparation du contrˆoleur centralis´e des dispositifs de transfert. La s´ecurit´e dans le SDN, en revanche, est un probl‘eme compliqu´e, le SDN a modiĄ´e la surface dŠattaque pr´esent´ee par les r´eseaux car il h´erite des vuln´erabilit´es des r´eseaux traditionnels via des protocoles partag´es tout en introduisant de nouvelles failles et faiblesses de s´ecurit´e. De nombreuses nouvelles technologies et techniques ont ´et´e introduites pour surmonter les vuln´erabilit´es de s´ecurit´e du SDN, et davantage travail peut ´egalement ˆetre fait pour les r´esoudre. Dans cet article, nous examinerons et expliquerons les vuln´erabilit´es qui inĆuencent le SDN, en les classant en deux cat´egories. la premier concern les vuln´erabilit´es caus´ees par lŠutilisation des protocoles r´eseau traditionnels et lŠautre concern les nouvelles failles de s´ecurit´e caus´ees par la mise en İuvre du SDN. Dans notre travail, nous essayons de prendre avantage de la visibilit´e du SDN et ses capacit´es de programmabilit´e pour construire ŤFCMŤ (Flow ConĆict Manager), une solution qui aide ‘a d´etecter et r´esoudre les conĆits de r‘egles de Ćux dans un r´eseau bas´e sur SDN.en_US
dc.language.isoenen_US
dc.subjectSoftware Deaned Networken_US
dc.subjectNetwork Programmabilityen_US
dc.subjectNetwork Securityen_US
dc.subjectFlow Rule conflictsen_US
dc.titleNetwork Security in Software Defined Networks (SDN):Problems,Solutions, and Future Directionsen_US
dc.typeThesisen_US
Appears in Collections:Master

Files in This Item:
File Description SizeFormat 
M_moire_Master-1-1.pdf111,93 kBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.