DC Field | Value | Language |
dc.contributor.author | MEGUITIF, M’Hamed | - |
dc.contributor.author | BOUZROURA, RAmzi | - |
dc.date.accessioned | 2022-11-08T08:47:47Z | - |
dc.date.available | 2022-11-08T08:47:47Z | - |
dc.date.issued | 2022 | - |
dc.identifier.uri | https://repository.esi-sba.dz/jspui/handle/123456789/308 | - |
dc.description | Encadreur Mr Alaa Eddine BELFEDHAL | en_US |
dc.description.abstract | Software-DeĄned Networking continues to grow in popularity because It allows
more effective network administration and provides additional functionalities like
programmability, elasticity, and Ćexibility which are things difficult to think of in a
classic inĆexible network architecture. All that is achieved Mostly due to the separation
of the centralized controller from the forwarding devices.
Security in SDN, on the other hand, is a complicated issue, SDN has changed
the attack surface that is presented by networks because it inherits vulnerabilities
from traditional networks via shared protocols while also introducing new security
Ćaws and weaknesses.
Many new technologies and techniques have been presented to overcome SDN
security Ćaws, and more work can be done to address them as well. In this paper,
we will examine and explain the vulnerabilities that inĆuence SDN, categorizing
them into two categories. the Ąrst one are vulnerabilities caused by the use of the
traditional network protocols and the other type are new security Ćaws caused by
the SDN implementation.
In our work, we try to take advantage of the SDN visibility and its programmability
capabilities to construct ŤFCMŤ (Flow ConĆict Manager), a solution that helps
to detect and resolve Ćow rule conĆicts in an SDN-based network.***
Le r´eseau d´eĄni par logiciel (SDN) continue de gagner en popularit´e car il permet
une administration r´eseau plus efficace et fournit des fonctionnalit´es suppl´ementaires
telles que la programmabilit´e, lŠ´elasticit´e et la Ćexibilit´e qui sont des choses difficiles
‘a imaginer dans une architecture r´eseau classique inĆexible. Tout cela est r´ealis´e
principalement grˆace ‘a la s´eparation du contrˆoleur centralis´e des dispositifs de transfert.
La s´ecurit´e dans le SDN, en revanche, est un probl‘eme compliqu´e, le SDN a
modiĄ´e la surface dŠattaque pr´esent´ee par les r´eseaux car il h´erite des vuln´erabilit´es
des r´eseaux traditionnels via des protocoles partag´es tout en introduisant de nouvelles
failles et faiblesses de s´ecurit´e.
De nombreuses nouvelles technologies et techniques ont ´et´e introduites pour surmonter
les vuln´erabilit´es de s´ecurit´e du SDN, et davantage travail peut ´egalement
ˆetre fait pour les r´esoudre. Dans cet article, nous examinerons et expliquerons les
vuln´erabilit´es qui inĆuencent le SDN, en les classant en deux cat´egories. la premier
concern les vuln´erabilit´es caus´ees par lŠutilisation des protocoles r´eseau traditionnels
et lŠautre concern les nouvelles failles de s´ecurit´e caus´ees par la mise en İuvre du
SDN.
Dans notre travail, nous essayons de prendre avantage de la visibilit´e du SDN et
ses capacit´es de programmabilit´e pour construire ŤFCMŤ (Flow ConĆict Manager),
une solution qui aide ‘a d´etecter et r´esoudre les conĆits de r‘egles de Ćux dans un
r´eseau bas´e sur SDN. | en_US |
dc.language.iso | en | en_US |
dc.subject | Software Deaned Network | en_US |
dc.subject | Network Programmability | en_US |
dc.subject | Network Security | en_US |
dc.subject | Flow Rule conflicts | en_US |
dc.title | Network Security in Software Defined Networks (SDN):Problems,Solutions, and Future Directions | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Master
|