Big Data helps SDN to detect intrusions and secure data flows

Big Data helps SDN to detect intrusions and secure data flows

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Big Data and Software Defined Networks — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this chapter, we examine the security risks of SDN with the consideration of intrusions and abnormal data flows. Specifically, we discuss how SDN brings unique risks and threats to network service providers and customers. Then, we discuss the potential of integrating Big Data analytics into SDN for security enhancement and provide some examples to end this chapter.

Chapter Contents:

  • 17.1 Introduction
  • 17.2 Security issues of SDN
  • 17.2.1 Security issues in control channel
  • 17.2.2 Denial-of-service (DoS) attacks
  • Unauthenticated channel DoS (outsider)
  • Man-in-the-middle DoS (outsider)
  • Compromised host DoS (insider)
  • 17.2.3 Simulation of control channel attack on SDN
  • 17.3 Big Data techniques for security threats in SDN
  • 17.3.1 Big Data analytics
  • 17.3.2 Data analytics for threat detection
  • 17.4 QoS consideration in SDN with security services
  • 17.4.1 Delay guarantee for security traversal
  • Optimal security routing
  • Optimal security traversal with middlebox addition
  • 17.4.2 Traffic load balancing
  • Traffic-aware load balancing using SDN
  • Delay performance comparison
  • 17.5 Big Data applications for securing SDN
  • 17.5.1 Packet inspection
  • 17.6 Open issues and challenge
  • 17.7 Summary and conclusion
  • References

Inspec keywords: Big Data; software defined networking; data analysis; computer network security

Other keywords: abnormal data flows; SDN; network service providers; security risks; Big Data analytics; secure data flows; security enhancement; intrusion detection

Subjects: Data security; Computer communications; Computer networks and techniques

Preview this chapter:
Zoom in

Big Data helps SDN to detect intrusions and secure data flows, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc015e/PBPC015E_ch17-1.gif /docserver/preview/fulltext/books/pc/pbpc015e/PBPC015E_ch17-2.gif

Related content

This is a required field
Please enter a valid email address