Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

Safeguarding Software-Defined Networks: Comprehensive Frameworks and Best Practices for Security Threat Mitigation

In Press, (this is not the final "Version of Record"). Available online 23 January, 2024
Author(s): Jyoti Verma, Manish Snehi, Isha Kansa*, Rajiv Kumar, Kanu Goel and Ranvijay Singh
Published on: 23 January, 2024

DOI: 10.2174/0123520965273025231121173901

Price: $95

conference banner
Abstract

The proliferation of IoT devices such as sensors, actuators, sensors, and other endpoints has resulted in a significant surge in data generation. Ensuring the security and efficiency of data transmission necessitates the implementation of an internet design that possesses the capability to scale as required. This study investigates the potential impact of SDN on enhancing the performance of IoT networks. This study examines the ability to adapt network resources in real-time to meet the demands of IoT applications. It is imperative to address the security vulnerabilities in the SDN architecture to ensure secure and reliable network operations. This paper thoroughly examines the challenges, various security solutions, and recommended practices for effectively protecting SDN infrastructures. This study comprehensively analyzes the pertinent scholarly works, conducts a comparative analysis of diverse security approaches, and assesses their respective advantages and limitations. The need for further investigation into the security aspects of SDN is also acknowledged. This article highlights the importance of enhancing security practices, implementing continuous monitoring, and identifying potential threats. Additionally, it presents case studies that exemplify real-world security challenges associated with SDN. Further, this study incorporates security solutions into SDN frameworks, emphasizing the significance of meticulous strategic preparation, comprehensive testing, and ongoing upkeep to ensure seamless interoperability with current systems. This study is significant as it contributes to the expanding literature on security in SDN. The comprehensive examination of existing literature, meticulous analysis, thorough review of security approaches, identification of issues and limitations, and exploration of potential avenues for future research in this work render it a valuable resource for researchers and practitioners investigating SDN security. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study provides comprehensive information on implementation, testbed settings, datasets, and experimental procedures to promote transparency and repeatability. The study presents findings from extensive testing and benchmarking, showcasing the effectiveness of security solutions in addressing different types of threats. The study focuses on achieving a harmonious equilibrium between accuracy and efficient utilization of resources. The primary objective of this study is to improve the reproducibility and pragmatic assessment of security measures in SDN settings. This study includes comprehensive information on implementation, testbed configuration, datasets, and experimental procedures to promote transparency and reproducibility. The study presents empirical evidence and analysis to support the effectiveness of security solutions in addressing different types of threats. It specifically focuses on achieving a trade-off between accuracy and efficient use of resources.


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy