Network Security and Management in SDN
1National University of Defense Technology, Changsha, China
2Xi’an Jiaotong University, Xi’an, China
3Huawei Technologies, Shenzhen, China
4New York University, New York City, USA
5Victoria University of Wellington, Wellington, New Zealand
Network Security and Management in SDN
Description
Software Defined Networking (SDN) enables flexible deployment and innovation of new networking applications by decoupling and abstracting the control and data planes. It has radically changed the concept and way that we build and manage networked systems and reduced the barriers to entry for new players in the services markets.
Recently, SDN has been widely studied and applied to facilitate network management and new network security systems development. However, the separation of control and data planes makes SDN vulnerable to security threats. Attackers can monitor and tamper network management information, disrupt network communication by implementing man-in-the-middle attacks, saturation attacks, denial of service attacks, and so on. Therefore, it is important to analyze the vulnerability, improve trust management, and design defense mechanism for securing SDN based systems.
Although some important progress has been made in SDN security, there are still many technical challenges. In this special issue, we welcome submissions addressing the underlying technical issues in the area of network security and management in SDN and aim to publish papers presenting recent research results and implementation experiences from both academia and industrial community. Original high quality articles as well as review papers offering a perspective on related work and identifying promising directions will also be considered.
Potential topics include but are not limited to the following:
- Vulnerability analysis and evaluations in SDN
- Network architecture of securing SDN
- Employment experiences of securing SDN
- Attack detection and response in SDN
- Abnormal traffic detection in SDN
- Potential solution of securing SDN
- Network and flow verification in SDN
- Protection and restoration in SDN
- Protocol of securing SDN
- QoS/QoE of securing SDN
- Authentication of securing SDN
- Data plane protection in SDN
- Control plane protection in SDN
- Test-bed and proof of concept
- Trust management in SDN
- Measurement in securing SDN