Software-defined network (SDN) data plane security: issues, solutions, and future directions

A Shaghaghi, MA Kaafar, R Buyya, S Jha - Handbook of Computer …, 2020 - Springer
Software-defined network (SDN) radically changes the network architecture by decoupling
the network logic from the underlying forwarding devices. This architectural change …

Cost optimization of secure routing with untrusted devices in software defined networking

A Yazdinejad, RM Parizi, A Dehghantanha… - Journal of Parallel and …, 2020 - Elsevier
Over the years, switches and network routers have been compromised frequently, and a lot
of vulnerabilities have occurred in network infrastructure. Secure routing (SR) is one of the …

Taking control of sdn-based cloud systems via the data plane

K Thimmaraju, B Shastry, T Fiebig, F Hetzelt… - Proceedings of the …, 2018 - dl.acm.org
Virtual switches are a crucial component of SDN-based cloud systems, enabling the
interconnection of virtual machines in a flexible and" software-defined" manner. This paper …

Wedgetail: An intrusion prevention system for the data plane of software defined networks

A Shaghaghi, MA Kaafar, S Jha - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
Networks are vulnerable to disruptions caused by malicious forwarding devices. The
situation is likely to worsen in Software Defined Networks (SDNs) with the incompatibility of …

A survey on the verification of adversarial data planes in software-defined networks

C Black, S Scott-Hayward - Proceedings of the 2021 ACM international …, 2021 - dl.acm.org
As network policies are becoming increasingly nuanced and complex, so too are the
mechanisms required to ensure that the network is functioning as intended. In particular …

Securing middlebox policy enforcement in SDN

K Bu, Y Yang, Z Guo, Y Yang, X Li, S Zhang - Computer Networks, 2021 - Elsevier
Abstract Software-Defined Networking (SDN) greatly simplifies middlebox policy
enforcement. Middleboxes need tag packet headers to avoid forwarding ambiguity on SDN …

Robust Routing Made Easy: Reinforcing Networks Against Non-Benign Faults

C Lenzen, M Medina, M Saberi… - IEEE/ACM Transactions …, 2023 - ieeexplore.ieee.org
With the increasing scale of communication networks, the likelihood of failures grows as
well. Since these networks form a critical backbone of our digital society, it is important that …

Fundamental Limits of Routing Attack on Network Overload

X Wu, E Modiano - arxiv preprint arxiv:2411.03749, 2024 - arxiv.org
We quantify the threat of network adversaries to inducing\emph {network overload}
through\emph {routing attacks}, where a subset of network nodes are hijacked by an …

Preacher: Network policy checker for adversarial environments

K Thimmaraju, L Schiff, S Schmid - IEEE/ACM Transactions on …, 2021 - ieeexplore.ieee.org
Private networks are typically assumed to be trusted as security mechanisms are usually
deployed on hosts and the data plane is managed in-house. The increasing number of …

WhiteRabbit: Scalable software-defined network data-plane verification method through time scheduling

T Shimizu, N Kitagawa, K Ohshima, N Yamai - IEEE Access, 2019 - ieeexplore.ieee.org
Software-defined networks are vulnerable to attacks by compromised switches because
commonly used programmable software switches are risky than traditional hardware ones …