A survey: Security issues of
Software defined networking
Gifty Susan Mani
Faculty Advisor: Dr. Ahmed Awad
Master of Science in Information, Network and
Computer Security
New York Institute of technology, Vancouver
What is SDN?
Why we need SDN?	
Does it ensure security for the future?
Introduction
•  Challenging task in the traditional networks: Maintaining the
changing environments according to the predefined policies.
•  Configuration of each network device separately: Requirement of
high-level policies considering the fundamental nature of network.
•  In traditional networks,
Control Plane: determines the traffic to be sent.
Data Plane: forwards the traffic at very high speed but lower
latency.
Router	
A	
Router		
D	
Router	
C	
1	 2	
Router	
B	
1
2	
4	
6	
8	
3	
4	
1	
															Traffic	Flow:	1	->	Router	A	->	Router	D	->	2	
Conventional Routing
Ideal Re-Routing
Router	
A	
Router		
D	
Router	
C	
1	 2	
Router	
B	
1
2	
4	
6	
8	
3	
4	
1	
																	Traffic	Flow:	1	->	Router	A	->	Router	C	->	2	
Failure
What is SDN
•  Active programming approach with a paradigm that separates the
control plane and data plane that allows easy optimization between
the control plane and network devices.
•  State Variability and Reusability.
•  Key attributes are:
- Programmability
- Openness
- Heterogeneity
-  Maintainability
SDN Explained…
•  Instead of putting the hardware together to form the network, it
focus on the services that run on the network.
•  It adds a software layer in between the hardware dealing with the
data and controls it.
•  Co-existence of Dissimilar networks on the same physical hardware.
•  Encourage the network innovation and deploys agile network
capabilities.
Comparison with traditional network
SDN Components
•  Control Plane: abstract view of the network.
•  North-bound Application Protocols: Represents the software interface
between the controller and applications.
•  East-West Protocols: Acts as control that manages the interaction between
the multi-controller environments.
•  Data Plane and south-bound protocols: forwards the communication from
the controller to the network infrastructure.
•  Open flow: Protocol to manage the southbound interface of the SDN
architecture.
SDN: Basic Architecture
Significance of SDN streamline
•  Respond faster to the changing environments with low cost.
•  80/20 rule of applications:80% should be the programmable solution
assembled in the infrastructure using the 20% commands that
request the high level request.
•  Service chaining sequence application specific procedures to a
client’s job.
•  Dynamic load management and implement bandwidth calendaring.
SDN in Network Security
•  SdN is considered to the disruptive technology in the network
security.
•  SDN creates security opportunities and security challenges.
•  35% of the network organizations believe that SDN will enable to
implement more effective security.
•  12% of the organizations believe the concerns of the security
vulnerabilities is a significant inhibitor to SDN deployment.
Deepening crisis and threats
Deepening crisis and threats
•  Mass customization: The use of unknown malware and
infections – increased malware campaigns.
•  Increased data loss across the industries and data types.
•  The server network is the most compromised asset by far over
the past 5 years.
•  Only 15% security breaches have a reliable count, 85% of the
breaches are incomplete.
Opportunities of SDN
•  Better utilization of the network access-55%.
•  Perform end-to-end view of the network-54%
•  Scale the network functionality and effective security functionality-
45%.
•  The deployment cycle has drastically reduced.
•  Defense in depth: Heterogeneity and decentralized nature of the
control plane.
•  Separation of monitoring and security enforcement elements
SDN Principles of Security
•  Availability and Performance.
•  Integrity and Confidentiality.
•  Authorization and authentication.
•  Resiliency.
•  Multi-domain Isolation.
•  Repudiation.
•  Transparency.
Security + SDN=Security Centric SDN
Security Challenges in SDN
•  SDN changes the entire security model.
•  SDN methodology rely on new overlay and encapsulation
techniques, many of current security tools are incompatible.
•  Virtualization made the SDN both more and less secure.
More Secure: Abstraction Layers.
Less Secure : Lack of physical access.
Security Limitation in SDN
Infrastructure
•  Data Layer: Insecure implementation of the management
application.
•  Control Layer: Centralized orchestration represents single point of
failure - compromise the control of the network flow.
•  Application Layer: Lack of mechanism in place to ensure the
authentication of the application access to the control plane.
Attack Vectors in SDN
Countermeasures
•  Protect the data layer- segregation of protocol traffic from the data
flow through out-of-band network or security measures.
•  Protect the control layer- Implementation of Role-based access
policies by verifying the legitimacy of the host migration.
•  Protect the application layer- Leverage in-line mode security
function in the applications to strengthen the the end user security.
Conclusion
•  Emerging approach to the network security and how it can smartly
replace the traditional networks.
•  SDN is not a technology but a paradigm that uses the concept of
virtualization and programmable protocol.
•  SDN security issues are more related to the control plane, inter-
component communication and controlling the scope applications
through access policies.
IoT to Internet of Everything
Questions?

More Related Content

PPT
Advanced Metering Infrastructure (AMI)
PPTX
Creative Mornings San Diego 2015
PPTX
Automatic Wireless Health Monitoring System In Hospitals For Patients
PPTX
Cash Flow Dashboard in Excel
PPTX
Price elasticity of demand
PPTX
Paging and segmentation
PDF
BRD Template
PPTX
Convolutional codes
Advanced Metering Infrastructure (AMI)
Creative Mornings San Diego 2015
Automatic Wireless Health Monitoring System In Hospitals For Patients
Cash Flow Dashboard in Excel
Price elasticity of demand
Paging and segmentation
BRD Template
Convolutional codes

What's hot (20)

PPTX
Ssl and tls
PPTX
Virtual Private Network(VPN)
PDF
Introduction to Software Defined Networking (SDN)
PPTX
Destination Sequenced Distance Vector Routing (DSDV)
PDF
Software Defined Networking (SDN) Technology Brief
ODP
Https presentation
PPT
Email security
PPTX
Cloud security ppt
PPTX
Cloud security Presentation
PPT
Secure shell ppt
PPT
Digital Signature
PPTX
TCP and UDP
PPT
Network security
PPTX
Cloud Security
PPTX
Virtualization in cloud computing
PPT
PPTX
RSA Algorithm
PPTX
Network security model.pptx
PPTX
Mobile Ad hoc Networks
Ssl and tls
Virtual Private Network(VPN)
Introduction to Software Defined Networking (SDN)
Destination Sequenced Distance Vector Routing (DSDV)
Software Defined Networking (SDN) Technology Brief
Https presentation
Email security
Cloud security ppt
Cloud security Presentation
Secure shell ppt
Digital Signature
TCP and UDP
Network security
Cloud Security
Virtualization in cloud computing
RSA Algorithm
Network security model.pptx
Mobile Ad hoc Networks
Ad

Viewers also liked (14)

PPTX
Software Defined Network - SDN
PPTX
PDF
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
PDF
Route flow autoconf demo 2nd sdn world congress 2013
PPTX
Understanding SDN
PDF
Attacking SDN infrastructure: Are we ready for the next gen networking
PDF
Forecast 2014: Software Defined Networking - What's New?
PDF
Tutorial on SDN and OpenFlow
PPTX
Software-Defined Networking , Survey of HotSDN 2012
PPTX
SDN and NFV: Friends or Enemies
PPTX
SDN Basics – What You Need to Know about Software-Defined Networking
PDF
Introduction to Software Defined Networking (SDN)
PPTX
Software-Defined Networking SDN - A Brief Introduction
PPTX
Cyber crime and security ppt
Software Defined Network - SDN
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Route flow autoconf demo 2nd sdn world congress 2013
Understanding SDN
Attacking SDN infrastructure: Are we ready for the next gen networking
Forecast 2014: Software Defined Networking - What's New?
Tutorial on SDN and OpenFlow
Software-Defined Networking , Survey of HotSDN 2012
SDN and NFV: Friends or Enemies
SDN Basics – What You Need to Know about Software-Defined Networking
Introduction to Software Defined Networking (SDN)
Software-Defined Networking SDN - A Brief Introduction
Cyber crime and security ppt
Ad

Similar to SDN-ppt-new (20)

PDF
Software Defined Networks - Unit -1- class lecture notes.pdf
PPTX
Software defined network
PPTX
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
PDF
SDN Security Talk - (ISC)2_3
PPTX
Simplifying SDN Networking Across Private and Public Clouds
PDF
Performance Analysis of Wireless Trusted Software Defined Networks
DOCX
Software Defined Networking Attacks and Countermeasures .docx
PPTX
PPTX
Software_Defined_Networking.pptx
PPTX
SDN NOTES (2).pptx for engineering students
PPTX
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
PDF
Final_Report
PDF
SDN Security: Two Sides of the Same Coin
PPTX
Software defined network-- SDN
PDF
Introduction to SDN
PPTX
Foundation of Modern Network- william stalling
PPTX
Software-Defined Networking Layers presentation
PPTX
Introduction to SDN: Software Defined Networking
PPT
Security of software defined networking (sdn) and cognitive radio network (crn)
Software Defined Networks - Unit -1- class lecture notes.pdf
Software defined network
Lqsqsssssssssssssssssssssssssssssssssssq18.pptx
SDN Security Talk - (ISC)2_3
Simplifying SDN Networking Across Private and Public Clouds
Performance Analysis of Wireless Trusted Software Defined Networks
Software Defined Networking Attacks and Countermeasures .docx
Software_Defined_Networking.pptx
SDN NOTES (2).pptx for engineering students
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Final_Report
SDN Security: Two Sides of the Same Coin
Software defined network-- SDN
Introduction to SDN
Foundation of Modern Network- william stalling
Software-Defined Networking Layers presentation
Introduction to SDN: Software Defined Networking
Security of software defined networking (sdn) and cognitive radio network (crn)

SDN-ppt-new

  • 1. A survey: Security issues of Software defined networking Gifty Susan Mani Faculty Advisor: Dr. Ahmed Awad Master of Science in Information, Network and Computer Security New York Institute of technology, Vancouver
  • 2. What is SDN? Why we need SDN? Does it ensure security for the future?
  • 3. Introduction •  Challenging task in the traditional networks: Maintaining the changing environments according to the predefined policies. •  Configuration of each network device separately: Requirement of high-level policies considering the fundamental nature of network. •  In traditional networks, Control Plane: determines the traffic to be sent. Data Plane: forwards the traffic at very high speed but lower latency.
  • 6. What is SDN •  Active programming approach with a paradigm that separates the control plane and data plane that allows easy optimization between the control plane and network devices. •  State Variability and Reusability. •  Key attributes are: - Programmability - Openness - Heterogeneity -  Maintainability
  • 7. SDN Explained… •  Instead of putting the hardware together to form the network, it focus on the services that run on the network. •  It adds a software layer in between the hardware dealing with the data and controls it. •  Co-existence of Dissimilar networks on the same physical hardware. •  Encourage the network innovation and deploys agile network capabilities.
  • 9. SDN Components •  Control Plane: abstract view of the network. •  North-bound Application Protocols: Represents the software interface between the controller and applications. •  East-West Protocols: Acts as control that manages the interaction between the multi-controller environments. •  Data Plane and south-bound protocols: forwards the communication from the controller to the network infrastructure. •  Open flow: Protocol to manage the southbound interface of the SDN architecture.
  • 11. Significance of SDN streamline •  Respond faster to the changing environments with low cost. •  80/20 rule of applications:80% should be the programmable solution assembled in the infrastructure using the 20% commands that request the high level request. •  Service chaining sequence application specific procedures to a client’s job. •  Dynamic load management and implement bandwidth calendaring.
  • 12. SDN in Network Security •  SdN is considered to the disruptive technology in the network security. •  SDN creates security opportunities and security challenges. •  35% of the network organizations believe that SDN will enable to implement more effective security. •  12% of the organizations believe the concerns of the security vulnerabilities is a significant inhibitor to SDN deployment.
  • 14. Deepening crisis and threats •  Mass customization: The use of unknown malware and infections – increased malware campaigns. •  Increased data loss across the industries and data types. •  The server network is the most compromised asset by far over the past 5 years. •  Only 15% security breaches have a reliable count, 85% of the breaches are incomplete.
  • 15. Opportunities of SDN •  Better utilization of the network access-55%. •  Perform end-to-end view of the network-54% •  Scale the network functionality and effective security functionality- 45%. •  The deployment cycle has drastically reduced. •  Defense in depth: Heterogeneity and decentralized nature of the control plane. •  Separation of monitoring and security enforcement elements
  • 16. SDN Principles of Security •  Availability and Performance. •  Integrity and Confidentiality. •  Authorization and authentication. •  Resiliency. •  Multi-domain Isolation. •  Repudiation. •  Transparency. Security + SDN=Security Centric SDN
  • 17. Security Challenges in SDN •  SDN changes the entire security model. •  SDN methodology rely on new overlay and encapsulation techniques, many of current security tools are incompatible. •  Virtualization made the SDN both more and less secure. More Secure: Abstraction Layers. Less Secure : Lack of physical access.
  • 18. Security Limitation in SDN Infrastructure •  Data Layer: Insecure implementation of the management application. •  Control Layer: Centralized orchestration represents single point of failure - compromise the control of the network flow. •  Application Layer: Lack of mechanism in place to ensure the authentication of the application access to the control plane.
  • 20. Countermeasures •  Protect the data layer- segregation of protocol traffic from the data flow through out-of-band network or security measures. •  Protect the control layer- Implementation of Role-based access policies by verifying the legitimacy of the host migration. •  Protect the application layer- Leverage in-line mode security function in the applications to strengthen the the end user security.
  • 21. Conclusion •  Emerging approach to the network security and how it can smartly replace the traditional networks. •  SDN is not a technology but a paradigm that uses the concept of virtualization and programmable protocol. •  SDN security issues are more related to the control plane, inter- component communication and controlling the scope applications through access policies.
  • 22. IoT to Internet of Everything