The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Future network innovation lies in software defined networking (SDN). This innovative technology has revolutionised the networking world for half a decade and contributes to transform legacy network architectures. This transformation blesses the networking world with improved performance and quality of service. However, security for SDN remains an afterthought. In this paper we present a detailed discussion...
In this paper we proposed policy based security architecture for securing the communication in multiple Autonomous System (AS) domains with Software Defined Networks (SDN). We will present a high level overview of the architecture and detail discussion on some of the important components for securing the communication in multiple AS domains. A key component of the security architecture is the specification...
Software Defined Network (SDN) is disruptive networking technology. In this paper, we will address some of the major vulnerable areas in SDN. We express some of the unique ways that an adversary can use to attack either the SDN controller or the communication devices. We have used a policy based approach to mitigate these attacks towards the SDN domain. We have implemented our Policy Based approach...
In this paper, we propose techniques for securing Software Defined Networks(SDN). We describe the design of a security architecture that makes use of security applications on top of the SDN Controller to specify fine granular security policies based on domain wide knowledge of the domain and Security Agents to enforce these policies in the switches in the data plane. We have extended the Open Flow...
In this paper, we propose a policy driven security architecture for securing end to end services across multiple autonomous domain based SDN environment. We develop a language based approach to designing a range of security policies that are relevant for SDN services and communications. The design of a security architecture that enables secure routing of packets based on the specified security policies...
This paper represents the novel numerical simulation and hardware simulation of the proposed Π- shape microstrip Antenna. The proposed antenna can cover mobile Worldwide Interoperability for Microwave Access (WiMAX) bands as well as Wireless-Fidelity (Wi-Fi) bands. This antenna also operates in the Industrial, Scientific and Medical (ISM) band at 2.45 GHz for biomedical applications. Our proposed...
During the path establishment, states of switching elements in the switch network may need rearrangement. C.-T. Lea et. al [1] has first mentioned about the rearrangement behavior of the switching networks. He has analyzed the frequency of its occurrence using stochastic method. It is notable that rearrangement behavior of switching network includes rearrangement of connections and rearrangement of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.