Security and Communication Networks

Network Security and Management in SDN


Status
Published

Lead Editor

1National University of Defense Technology, Changsha, China

2Xi’an Jiaotong University, Xi’an, China

3Huawei Technologies, Shenzhen, China

4New York University, New York City, USA

5Victoria University of Wellington, Wellington, New Zealand


Network Security and Management in SDN

Description

Software Defined Networking (SDN) enables flexible deployment and innovation of new networking applications by decoupling and abstracting the control and data planes. It has radically changed the concept and way that we build and manage networked systems and reduced the barriers to entry for new players in the services markets.

Recently, SDN has been widely studied and applied to facilitate network management and new network security systems development. However, the separation of control and data planes makes SDN vulnerable to security threats. Attackers can monitor and tamper network management information, disrupt network communication by implementing man-in-the-middle attacks, saturation attacks, denial of service attacks, and so on. Therefore, it is important to analyze the vulnerability, improve trust management, and design defense mechanism for securing SDN based systems.

Although some important progress has been made in SDN security, there are still many technical challenges. In this special issue, we welcome submissions addressing the underlying technical issues in the area of network security and management in SDN and aim to publish papers presenting recent research results and implementation experiences from both academia and industrial community. Original high quality articles as well as review papers offering a perspective on related work and identifying promising directions will also be considered.

Potential topics include but are not limited to the following:

  • Vulnerability analysis and evaluations in SDN
  • Network architecture of securing SDN
  • Employment experiences of securing SDN
  • Attack detection and response in SDN
  • Abnormal traffic detection in SDN
  • Potential solution of securing SDN
  • Network and flow verification in SDN
  • Protection and restoration in SDN
  • Protocol of securing SDN
  • QoS/QoE of securing SDN
  • Authentication of securing SDN
  • Data plane protection in SDN
  • Control plane protection in SDN
  • Test-bed and proof of concept
  • Trust management in SDN
  • Measurement in securing SDN

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 7928503
  • - Editorial

Network Security and Management in SDN

Zhiping Cai | Chengchen Hu | ... | Qiang Fu
  • Special Issue
  • - Volume 2018
  • - Article ID 9804061
  • - Research Article

A DDoS Attack Detection Method Based on SVM in Software Defined Network

Jin Ye | Xiangyang Cheng | ... | Ling Song
  • Special Issue
  • - Volume 2018
  • - Article ID 9649643
  • - Research Article

OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

Biao Han | Xiangrui Yang | ... | Jinshu Su
  • Special Issue
  • - Volume 2018
  • - Article ID 4123736
  • - Research Article

Security Analysis of Dynamic SDN Architectures Based on Game Theory

Chao Qi | Jiangxing Wu | ... | Shuo Zhao
  • Special Issue
  • - Volume 2018
  • - Article ID 6751042
  • - Research Article

Duo: Software Defined Intrusion Tolerant System Using Dual Cluster

Yongjae Lee | Seunghyeon Lee | ... | Hyunsoo Yoon
  • Special Issue
  • - Volume 2018
  • - Article ID 5650205
  • - Research Article

FAS: Using FPGA to Accelerate and Secure SDN Software Switches

Wenwen Fu | Tao Li | Zhigang Sun
  • Special Issue
  • - Volume 2018
  • - Article ID 6361901
  • - Research Article

Kuijia: Traffic Rescaling in Software-Defined Data Center WANs

Che Zhang | Hong Xu | ... | Peng Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 7545079
  • - Research Article

SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction

Tao Wang | Hongchang Chen | ... | Yulin Lu
  • Special Issue
  • - Volume 2018
  • - Article ID 4760632
  • - Research Article

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Yadong Zhou | Kaiyue Chen | ... | Yazhe Tang
  • Special Issue
  • - Volume 2017
  • - Article ID 3659167
  • - Research Article

CHAOS: An SDN-Based Moving Target Defense System

Yuan Shi | Huanguo Zhang | ... | Bo Zhao
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.