{"title":"Detection of Attacks in Software-Defined Networks (SDN)* : *How to conduct attacks in SDN environments","authors":"Jean Rosemond Dora, L. Hluchý","doi":"10.1109/SACI58269.2023.10158584","DOIUrl":null,"url":null,"abstract":"Over decades, the software-defined network commonly named SDN has been prioritized by many industries and academia over traditional networks. The SDN properties offer better security of the managed network and offer better network monitoring. However, its popularity has been drawn drastically to attackers’ attention. In this paper, we evaluate the security posture of the SDN networks and prove that they are subject to several vulnerabilities by simulating attacks against devices in the network. Abusing those weaknesses can jeopardize the company’s reputation as well as its financial situation. Therefore, to achieve the exploitation, we simulate the attacks using Mininet and RYU controller tools. Additionally, we briefly talk about the mitigation techniques as we will deal with them in our future work.","PeriodicalId":339156,"journal":{"name":"2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SACI58269.2023.10158584","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Over decades, the software-defined network commonly named SDN has been prioritized by many industries and academia over traditional networks. The SDN properties offer better security of the managed network and offer better network monitoring. However, its popularity has been drawn drastically to attackers’ attention. In this paper, we evaluate the security posture of the SDN networks and prove that they are subject to several vulnerabilities by simulating attacks against devices in the network. Abusing those weaknesses can jeopardize the company’s reputation as well as its financial situation. Therefore, to achieve the exploitation, we simulate the attacks using Mininet and RYU controller tools. Additionally, we briefly talk about the mitigation techniques as we will deal with them in our future work.