Article Review: countermeasures to threats in networking

Citations and pdf.

Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A. V., & Imran, M. (2016). Security in software-defined networking: Threats and countermeasures. Mobile Networks and Applications, 21(5), 764-776. doi:http://dx.doi.org/10.1007/s11036-016-0676-x

Security_in_Software-Defined_N

Abstract of the Article:

“In recent years, Software-Defined Networking (SDN) has been a focus of research. As a promising network architecture, SDN will possibly replace traditional networking, as it brings promising opportunities for network management in terms of simplicity, programmability, and elasticity. While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be also paid to security at this early design stage. This paper focuses on the security aspects of SDN. We begin by discussing characteristics and standards of SDN. On the basis of these, we discuss the security features as a whole and then analyze the security threats and countermeasures in detail from three aspects, based on which part of the SDN paradigm they target, i.e., the data forwarding layer, the control layer and the application layer. Countermeasure techniques that could be used to prevent, mitigate, or recover from some of such attacks are also described, while the threats encountered when developing these defensive mechanisms are highlighted.”

Experimental or non-experimental.

The study is experimental design. Mainly because they can decide where the attack could happen. They showed where there could be possible attack points in the network. If it was non-experimental then it would need to be happening at the current time of researching.

Qualitative or quantitative?

The data that was collect is qualitative. There were no numbers really collected in the article. Instead, they provided descriptions which went into detail explaining what the data means.

What was the Population studied.

The population that is being studied would be any network that is using the SDN architecture. Reason being is that is the main area being talked about in the article. This would mainly be good for security experts in that field.

what was the sample?

I would say that the sample size is one. It seems that this experiment was setup in a controlled environment to show the potential weaknesses in a basic network setup.

Method of Measurement

The data that was being collected was the connections between applications, switches, controller, network packets, weak points in the network, and possible attack routes.

Method of Analysis.

The first thing they did was an overview of the systems in question. mainly going into detail of how the system operates. Then they went in and views all the security threats that the system could potentially have. After that they investigated all the counter measures to help reduce the risk of an attack.

Conclusion of the study.

The conclusion of the study was to show how the SDN system functions and what are the possible threats to the system. Then what are the countermeasures that need to be in place to reduce threats to the system. This study should gain some attention in how to reduce risks of attacks on a network.

Why was the study useful to me?

Considering this is the type of field that I would be working in. The knowledge of the possible attack points on a network would be beneficial to me. so, when it comes time for me to setup a network, I know that I would need to keep this article in mind and reduce the chances of any threats that may occur. Another part is that with a current project I am working with I do find this relevant because I need to make sure that I keep the network secured as possible.

What would be the next logical step in extending the study?

I would look at other points of interest in the network. the article was heavily focused in one area. I would expand out to see what other threats could be lingering in the shadow. Then continuing to provide additional counter measures as new vulnerability gets discovered. Other than that, I don’t think there is much else to expand on with in this article.

 

About Justin Korbe

Hello, My name is Justin Korbe. I am a senior here at Fort Hays State University. My goal is to get a bachelors in Networking and telecommunications with a concentration in Information Systems. I expect to graduate in Spring 2022.

One thought on “Article Review: countermeasures to threats in networking

  1. Hey Justin,
    I thought the article was an interesting read about Software-Defined Networking and its security threats. When considering attacks on a network, I think of DOS attacks, trojan horse viruses, and other possible malware to compromise a system. Last semester I got a certification in Cisco Networking, where I learned about switches, applications, and network packets. One of the main emphases in sending data packets was ensuring the receiver was not fraudulent or an imposter. As mentioned in my article review, it takes one person to compromise a network if they do not secure a network.

Leave a Reply to Peyton Rohan Cancel reply

Your email address will not be published. Required fields are marked *