SlideShare a Scribd company logo
A survey: Security issues of
Software defined networking
Gifty Susan Mani
Faculty Advisor: Dr. Ahmed Awad
Master of Science in Information, Network and
Computer Security
New York Institute of technology, Vancouver
What is SDN?
Why we need SDN?	
Does it ensure security for the future?
Introduction
•  Challenging task in the traditional networks: Maintaining the
changing environments according to the predefined policies.
•  Configuration of each network device separately: Requirement of
high-level policies considering the fundamental nature of network.
•  In traditional networks,
Control Plane: determines the traffic to be sent.
Data Plane: forwards the traffic at very high speed but lower
latency.
Router	
A	
Router		
D	
Router	
C	
1	 2	
Router	
B	
1
2	
4	
6	
8	
3	
4	
1	
															Traffic	Flow:	1	->	Router	A	->	Router	D	->	2	
Conventional Routing
Ideal Re-Routing
Router	
A	
Router		
D	
Router	
C	
1	 2	
Router	
B	
1
2	
4	
6	
8	
3	
4	
1	
																	Traffic	Flow:	1	->	Router	A	->	Router	C	->	2	
Failure
What is SDN
•  Active programming approach with a paradigm that separates the
control plane and data plane that allows easy optimization between
the control plane and network devices.
•  State Variability and Reusability.
•  Key attributes are:
- Programmability
- Openness
- Heterogeneity
-  Maintainability
SDN Explained…
•  Instead of putting the hardware together to form the network, it
focus on the services that run on the network.
•  It adds a software layer in between the hardware dealing with the
data and controls it.
•  Co-existence of Dissimilar networks on the same physical hardware.
•  Encourage the network innovation and deploys agile network
capabilities.
Comparison with traditional network
SDN Components
•  Control Plane: abstract view of the network.
•  North-bound Application Protocols: Represents the software interface
between the controller and applications.
•  East-West Protocols: Acts as control that manages the interaction between
the multi-controller environments.
•  Data Plane and south-bound protocols: forwards the communication from
the controller to the network infrastructure.
•  Open flow: Protocol to manage the southbound interface of the SDN
architecture.
SDN: Basic Architecture
Significance of SDN streamline
•  Respond faster to the changing environments with low cost.
•  80/20 rule of applications:80% should be the programmable solution
assembled in the infrastructure using the 20% commands that
request the high level request.
•  Service chaining sequence application specific procedures to a
client’s job.
•  Dynamic load management and implement bandwidth calendaring.
SDN in Network Security
•  SdN is considered to the disruptive technology in the network
security.
•  SDN creates security opportunities and security challenges.
•  35% of the network organizations believe that SDN will enable to
implement more effective security.
•  12% of the organizations believe the concerns of the security
vulnerabilities is a significant inhibitor to SDN deployment.
Deepening crisis and threats
Deepening crisis and threats
•  Mass customization: The use of unknown malware and
infections – increased malware campaigns.
•  Increased data loss across the industries and data types.
•  The server network is the most compromised asset by far over
the past 5 years.
•  Only 15% security breaches have a reliable count, 85% of the
breaches are incomplete.
Opportunities of SDN
•  Better utilization of the network access-55%.
•  Perform end-to-end view of the network-54%
•  Scale the network functionality and effective security functionality-
45%.
•  The deployment cycle has drastically reduced.
•  Defense in depth: Heterogeneity and decentralized nature of the
control plane.
•  Separation of monitoring and security enforcement elements
SDN Principles of Security
•  Availability and Performance.
•  Integrity and Confidentiality.
•  Authorization and authentication.
•  Resiliency.
•  Multi-domain Isolation.
•  Repudiation.
•  Transparency.
Security + SDN=Security Centric SDN
Security Challenges in SDN
•  SDN changes the entire security model.
•  SDN methodology rely on new overlay and encapsulation
techniques, many of current security tools are incompatible.
•  Virtualization made the SDN both more and less secure.
More Secure: Abstraction Layers.
Less Secure : Lack of physical access.
Security Limitation in SDN
Infrastructure
•  Data Layer: Insecure implementation of the management
application.
•  Control Layer: Centralized orchestration represents single point of
failure - compromise the control of the network flow.
•  Application Layer: Lack of mechanism in place to ensure the
authentication of the application access to the control plane.
Attack Vectors in SDN
Countermeasures
•  Protect the data layer- segregation of protocol traffic from the data
flow through out-of-band network or security measures.
•  Protect the control layer- Implementation of Role-based access
policies by verifying the legitimacy of the host migration.
•  Protect the application layer- Leverage in-line mode security
function in the applications to strengthen the the end user security.
Conclusion
•  Emerging approach to the network security and how it can smartly
replace the traditional networks.
•  SDN is not a technology but a paradigm that uses the concept of
virtualization and programmable protocol.
•  SDN security issues are more related to the control plane, inter-
component communication and controlling the scope applications
through access policies.
IoT to Internet of Everything
Questions?

More Related Content

What's hot

Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
Chat Application [Full Documentation]
Chat Application [Full Documentation]Chat Application [Full Documentation]
Chat Application [Full Documentation]
Rajon
 
Online Food Ordering System
Online Food Ordering SystemOnline Food Ordering System
Online Food Ordering System
Ankita Jangir
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
vasanthimuniasamy
 
The complete srs documentation of our developed game.
The complete srs documentation of our developed game. The complete srs documentation of our developed game.
The complete srs documentation of our developed game.
Isfand yar Khan
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
Manisha Keim
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
Kongu Engineering College, Perundurai, Erode
 
Airline Reservation System Documentation
Airline Reservation System DocumentationAirline Reservation System Documentation
Airline Reservation System Documentation
Sanjana Agarwal
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
Prajakta Rane
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
OECLIB Odisha Electronics Control Library
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management system
SM. Aurnob
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency Control
Dilum Bandara
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
Manoj Kumar
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Online Examination System Project report
Online Examination System Project report Online Examination System Project report
Online Examination System Project report
SARASWATENDRA SINGH
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Android Project Presentation
Android Project PresentationAndroid Project Presentation
Android Project Presentation
Laxmi Kant Yadav
 
E-commerce (System Analysis and Design)
E-commerce (System Analysis and Design)E-commerce (System Analysis and Design)
E-commerce (System Analysis and Design)
Nazmul Hyder
 

What's hot (20)

Data link layer
Data link layer Data link layer
Data link layer
 
Cloud security
Cloud securityCloud security
Cloud security
 
Chat Application [Full Documentation]
Chat Application [Full Documentation]Chat Application [Full Documentation]
Chat Application [Full Documentation]
 
Online Food Ordering System
Online Food Ordering SystemOnline Food Ordering System
Online Food Ordering System
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
The complete srs documentation of our developed game.
The complete srs documentation of our developed game. The complete srs documentation of our developed game.
The complete srs documentation of our developed game.
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Computer Networks: Quality of service
Computer Networks: Quality of serviceComputer Networks: Quality of service
Computer Networks: Quality of service
 
Airline Reservation System Documentation
Airline Reservation System DocumentationAirline Reservation System Documentation
Airline Reservation System Documentation
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management system
 
Transactions and Concurrency Control
Transactions and Concurrency ControlTransactions and Concurrency Control
Transactions and Concurrency Control
 
Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Online Examination System Project report
Online Examination System Project report Online Examination System Project report
Online Examination System Project report
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Android Project Presentation
Android Project PresentationAndroid Project Presentation
Android Project Presentation
 
E-commerce (System Analysis and Design)
E-commerce (System Analysis and Design)E-commerce (System Analysis and Design)
E-commerce (System Analysis and Design)
 

Viewers also liked

Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
Venkata Naga Ravi
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Siyabonga Masuku
 
Route flow autoconf demo 2nd sdn world congress 2013
Route flow autoconf demo   2nd sdn world congress 2013Route flow autoconf demo   2nd sdn world congress 2013
Route flow autoconf demo 2nd sdn world congress 2013FIBRE Testbed
 
Understanding SDN
Understanding SDNUnderstanding SDN
Understanding SDN
Saurabh Agarwal
 
Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networking
Priyanka Aash
 
Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Software Defined Networking - What's New? Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Software Defined Networking - What's New?
Open Data Center Alliance
 
Tutorial on SDN and OpenFlow
Tutorial on SDN and OpenFlowTutorial on SDN and OpenFlow
Tutorial on SDN and OpenFlow
Kingston Smiler
 
Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012
Jason TC HOU (侯宗成)
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or Enemies
Justyna Bak
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined Networking
SDxCentral
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
rjain51
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief Introduction
Jason TC HOU (侯宗成)
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (14)

Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
 
Route flow autoconf demo 2nd sdn world congress 2013
Route flow autoconf demo   2nd sdn world congress 2013Route flow autoconf demo   2nd sdn world congress 2013
Route flow autoconf demo 2nd sdn world congress 2013
 
Understanding SDN
Understanding SDNUnderstanding SDN
Understanding SDN
 
Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networking
 
Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Software Defined Networking - What's New? Forecast 2014: Software Defined Networking - What's New?
Forecast 2014: Software Defined Networking - What's New?
 
Tutorial on SDN and OpenFlow
Tutorial on SDN and OpenFlowTutorial on SDN and OpenFlow
Tutorial on SDN and OpenFlow
 
Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012Software-Defined Networking , Survey of HotSDN 2012
Software-Defined Networking , Survey of HotSDN 2012
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or Enemies
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined Networking
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief Introduction
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to SDN-ppt-new

Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdf
softwaretrainer2elys
 
Software defined network
Software defined networkSoftware defined network
Software defined network
Deeptiman Mallick
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3Wen-Pai Lu
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
5nine
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
rosemariebrayshaw
 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptx
AsfawGedamu
 
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Aruba, a Hewlett Packard Enterprise company
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
Zivaro Inc
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDN
Aadarsh Sharma
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
Zivaro Inc
 
Introduction to SDN
Introduction to SDNIntroduction to SDN
Introduction to SDN
NetCraftsmen
 
Foundation of Modern Network- william stalling
Foundation of Modern Network- william stallingFoundation of Modern Network- william stalling
Foundation of Modern Network- william stalling
JonathanWallace46
 
Software-Defined Networking Layers presentation
Software-Defined Networking Layers presentationSoftware-Defined Networking Layers presentation
Software-Defined Networking Layers presentation
Abdullah Salama
 
Introduction to SDN: Software Defined Networking
Introduction to SDN: Software Defined NetworkingIntroduction to SDN: Software Defined Networking
Introduction to SDN: Software Defined Networking
Ankita Mahajan
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
Ameer Sameer
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
 

Similar to SDN-ppt-new (20)

Software Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdfSoftware Defined Networks - Unit -1- class lecture notes.pdf
Software Defined Networks - Unit -1- class lecture notes.pdf
 
Software defined network
Software defined networkSoftware defined network
Software defined network
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
Software Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docxSoftware Defined Networking Attacks and Countermeasures .docx
Software Defined Networking Attacks and Countermeasures .docx
 
Sdn
SdnSdn
Sdn
 
SDN
SDNSDN
SDN
 
Software_Defined_Networking.pptx
Software_Defined_Networking.pptxSoftware_Defined_Networking.pptx
Software_Defined_Networking.pptx
 
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
 
Final_Report
Final_ReportFinal_Report
Final_Report
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
Software defined network-- SDN
Software defined network-- SDNSoftware defined network-- SDN
Software defined network-- SDN
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
Introduction to SDN
Introduction to SDNIntroduction to SDN
Introduction to SDN
 
Foundation of Modern Network- william stalling
Foundation of Modern Network- william stallingFoundation of Modern Network- william stalling
Foundation of Modern Network- william stalling
 
Software-Defined Networking Layers presentation
Software-Defined Networking Layers presentationSoftware-Defined Networking Layers presentation
Software-Defined Networking Layers presentation
 
Introduction to SDN: Software Defined Networking
Introduction to SDN: Software Defined NetworkingIntroduction to SDN: Software Defined Networking
Introduction to SDN: Software Defined Networking
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 

SDN-ppt-new

  • 1. A survey: Security issues of Software defined networking Gifty Susan Mani Faculty Advisor: Dr. Ahmed Awad Master of Science in Information, Network and Computer Security New York Institute of technology, Vancouver
  • 2. What is SDN? Why we need SDN? Does it ensure security for the future?
  • 3. Introduction •  Challenging task in the traditional networks: Maintaining the changing environments according to the predefined policies. •  Configuration of each network device separately: Requirement of high-level policies considering the fundamental nature of network. •  In traditional networks, Control Plane: determines the traffic to be sent. Data Plane: forwards the traffic at very high speed but lower latency.
  • 6. What is SDN •  Active programming approach with a paradigm that separates the control plane and data plane that allows easy optimization between the control plane and network devices. •  State Variability and Reusability. •  Key attributes are: - Programmability - Openness - Heterogeneity -  Maintainability
  • 7. SDN Explained… •  Instead of putting the hardware together to form the network, it focus on the services that run on the network. •  It adds a software layer in between the hardware dealing with the data and controls it. •  Co-existence of Dissimilar networks on the same physical hardware. •  Encourage the network innovation and deploys agile network capabilities.
  • 9. SDN Components •  Control Plane: abstract view of the network. •  North-bound Application Protocols: Represents the software interface between the controller and applications. •  East-West Protocols: Acts as control that manages the interaction between the multi-controller environments. •  Data Plane and south-bound protocols: forwards the communication from the controller to the network infrastructure. •  Open flow: Protocol to manage the southbound interface of the SDN architecture.
  • 11. Significance of SDN streamline •  Respond faster to the changing environments with low cost. •  80/20 rule of applications:80% should be the programmable solution assembled in the infrastructure using the 20% commands that request the high level request. •  Service chaining sequence application specific procedures to a client’s job. •  Dynamic load management and implement bandwidth calendaring.
  • 12. SDN in Network Security •  SdN is considered to the disruptive technology in the network security. •  SDN creates security opportunities and security challenges. •  35% of the network organizations believe that SDN will enable to implement more effective security. •  12% of the organizations believe the concerns of the security vulnerabilities is a significant inhibitor to SDN deployment.
  • 14. Deepening crisis and threats •  Mass customization: The use of unknown malware and infections – increased malware campaigns. •  Increased data loss across the industries and data types. •  The server network is the most compromised asset by far over the past 5 years. •  Only 15% security breaches have a reliable count, 85% of the breaches are incomplete.
  • 15. Opportunities of SDN •  Better utilization of the network access-55%. •  Perform end-to-end view of the network-54% •  Scale the network functionality and effective security functionality- 45%. •  The deployment cycle has drastically reduced. •  Defense in depth: Heterogeneity and decentralized nature of the control plane. •  Separation of monitoring and security enforcement elements
  • 16. SDN Principles of Security •  Availability and Performance. •  Integrity and Confidentiality. •  Authorization and authentication. •  Resiliency. •  Multi-domain Isolation. •  Repudiation. •  Transparency. Security + SDN=Security Centric SDN
  • 17. Security Challenges in SDN •  SDN changes the entire security model. •  SDN methodology rely on new overlay and encapsulation techniques, many of current security tools are incompatible. •  Virtualization made the SDN both more and less secure. More Secure: Abstraction Layers. Less Secure : Lack of physical access.
  • 18. Security Limitation in SDN Infrastructure •  Data Layer: Insecure implementation of the management application. •  Control Layer: Centralized orchestration represents single point of failure - compromise the control of the network flow. •  Application Layer: Lack of mechanism in place to ensure the authentication of the application access to the control plane.
  • 20. Countermeasures •  Protect the data layer- segregation of protocol traffic from the data flow through out-of-band network or security measures. •  Protect the control layer- Implementation of Role-based access policies by verifying the legitimacy of the host migration. •  Protect the application layer- Leverage in-line mode security function in the applications to strengthen the the end user security.
  • 21. Conclusion •  Emerging approach to the network security and how it can smartly replace the traditional networks. •  SDN is not a technology but a paradigm that uses the concept of virtualization and programmable protocol. •  SDN security issues are more related to the control plane, inter- component communication and controlling the scope applications through access policies.
  • 22. IoT to Internet of Everything