Guide to Security in SDN and NFV

Challenges, Opportunities, and Applications

  • Shao Ying Zhu
  • Sandra Scott-Hayward
  • Ludovic Jacquin
  • Richard Hill

Part of the Computer Communications and Networks book series (CCN)

Table of contents

  1. Front Matter
    Pages i-xxii
  2. Introduction to Security in SDNFV – Key Concepts

    1. Front Matter
      Pages 1-1
    2. Igor Faynberg, Steve Goeringer
      Pages 33-73
    3. Andrés F. Murillo, Sandra Julieta Rueda, Laura Victoria Morales, Álvaro A. Cárdenas
      Pages 75-101
    4. Antonio Lioy, Tao Su, Adrian L. Shaw, Hamza Attak, Diego R. Lopez, Antonio Pastor
      Pages 103-124
  3. SDNFV Security Challenges and Network Security Solutions

    1. Front Matter
      Pages 125-125
    2. Antonio Pastor, Jesús Folgueira
      Pages 127-148
    3. Jacob H. Cox Jr., Russell J. Clark, Henry L. Owen III
      Pages 149-169
    4. Abeer Ali, Richard Cziva, Simon Jouët, Dimitrios P. Pezaros
      Pages 171-196
    5. Hamza Attak, Marco Casassa-Mont, Cristian Dávila, Eleni-Constantina Davri, Carolina Fernandez, Georgios Gardikis et al.
      Pages 197-225
  4. Security Implications of SDNFV in Future Networks

    1. Front Matter
      Pages 227-227
    2. Rahamatullah Khondoker, Pedro Larbig, Dirk Scheuermann, Frank Weber, Kpatcha Bayarou
      Pages 229-251
    3. Mateus Augusto Silva Santos, Alireza Ranjbar, Gergely Biczók, Barbara Martini, Francesco Paolucci
      Pages 253-272
    4. Vinod K. Mishra, Dinesh C. Verma, Christopher Williams
      Pages 273-298
    5. Théo Combe, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Bertrand Mathieu, Edgardo Montes de Oca
      Pages 299-321
  5. Back Matter
    Pages 323-331

About this book


This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks.

Topics and features:

  • Introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security
  • Discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation
  • Reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN
  • Describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats
  • Examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G
  • Investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture
  • Includes review questions in each chapter, to test the reader’s understanding of each of the key concepts described

This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems.

Dr. Shao Ying Zhu is a Senior Lecturer in Computing at the University of Derby, UK. Dr. Sandra Scott-Hayward is a Lecturer (Assistant Professor) at Queen’s University Belfast, Northern Ireland. Dr. Ludovic Jacquin is a Senior Researcher at Hewlett Packard Labs - the research organisation of Hewlett Packard Enterprise - in Bristol, UK. Prof. Richard Hill is the Head of the Department of Informatics and the Director of the Centre for Industrial Analytics at the University of Huddersfield, UK. The other publications of the editors include the Springer titles Guide to Security Assurance for Cloud Computing and Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications.​


Software defined networking Network function virtualization Security architecture Security application Computer networks

Editors and affiliations

  1. 1.University of DerbyDerbyUnited Kingdom
  2. 2.Queen’s University BelfastBelfastUnited Kingdom
  3. 3.Hewlett Packard LabsBristolUnited Kingdom
  4. 4.University of HuddersfieldHuddersfieldUnited Kingdom

Bibliographic information