• Login
    View Item 
    •   DSpace Home
    • SUNY Polytechnic Institute
    • Master's Theses and Projects
    • College of Engineering, SUNY Polytechnic Institute
    • View Item
    •   DSpace Home
    • SUNY Polytechnic Institute
    • Master's Theses and Projects
    • College of Engineering, SUNY Polytechnic Institute
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDepartmentThis CollectionBy Issue DateAuthorsTitlesSubjectsDepartment

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    SECURITY CHALLENGES IN SDN IMPLEMENTATION

    Thumbnail
    View/Open
    Security Challenges in SDN Implementation (886.4Kb)
    signed (30.31Kb)
    consent to place in digital repository (236.4Kb)
    Date
    2018-05
    Author
    Patil, Pradnya
    Hash, Larry; Advisor
    White, Joshua; Reviewer
    Tekeoglu, Ali, Reviewer
    Metadata
    Show full item record
    Subject
    SDN
    Denial of Service
    telecommunications
    computer security
    OpenFlow
    Abstract
    This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network engineers’ views on preventing those security issues and whether implementing SDN is a good idea in the first place. This study was conducted in order to answer three questions: 1. How does data and control layer separation in SDN cause DoS and unauthorized access attacks? 2. What are the best practices and measures to minimize such security threats from the engineer’s point of view? 3. Do security threats at the lower layer affect the decision to implement SDN? These questions were answered by reviewing research papers and interviewing engineers from the telecommunication field. DoS and unauthorized access attacks are due to vulnerabilities in OpenFlow, SDN switches and SDN controllers. Table 6 presents solutions for preventing DoS and unauthorized access attacks. Most of the network engineers said SDN should be implemented based on cost, limited risk, customers’ positive views, and company projects, despite the current security challenges.
    Description
    Master of Science Thesis in Telecommunications, Department of Computer Science, SUNY College of Technology at Utica/Rome. Approved and recommended for acceptance as a project in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. Submitted by author to digital archive, Sept. 2018.
    URI
    http://hdl.handle.net/1951/70393
    Collections
    • College of Engineering, SUNY Polytechnic Institute [44]

    SUNY Digital Repository Support
    DSpace software copyright © 2002-2023  DuraSpace
    Contact Us | Send Feedback
    DSpace Express is a service operated by 
    Atmire NV
     

     


    SUNY Digital Repository Support
    DSpace software copyright © 2002-2023  DuraSpace
    Contact Us | Send Feedback
    DSpace Express is a service operated by 
    Atmire NV