Skip to main content

Software-Defined Network Privacy

  • Living reference work entry
  • First Online:
Encyclopedia of Cryptography, Security and Privacy
  • 26 Accesses

Definitions

Software-defined networking (SDN) is a networking paradigm based on an intelligent and logically centralised control logic (i.e. control plane) decoupled from the forwarding functionality of network devices (i.e. data plane) and on a set of standard application programming interfaces (APIs) and protocols to facilitate the communication between planes.

Background

Traditional IP networks were originally designed following a decentralised model in which the control and data planes are bundled together in all network devices. This was suitable to achieve network resilience and scalability but at the same time caused networks to be complex and hard to manage. For example, to implement the desired high-level network policies, network operators typically need to manually configure each network device separately using low-level and vendor-specific commands. As a result, configuring network devices has become a laborious and error-prone task, especially in heterogeneous networks...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Cao J, Yang Z, Sun K, Li Q, Xu M, Han P (2019) Fingerprinting SDN applications via encrypted control traffic. In: 22nd international symposium on research in attacks, intrusions and defenses (RAID 2019), pp 501–515

    Google Scholar 

  • Dhawan M, Poddar R, Mahajan K, Mann V (2015) SPHINX: Detecting Security Attacks in Software-Defined Networks. In: Network and Distributed System Security Symposium (NDSS), pp pages 8–11

    Google Scholar 

  • Hong S, Xu L, Wang H, Gu G (2015) Poisoning network visibility in software-defined networks: new attacks and countermeasures. In: Network and distributed system security symposium (NDSS), pp 8–11

    Google Scholar 

  • Leng J, Zhou Y, Zhang J, Hu C (2015) An inference attack model for flow table capacity and usage: exploiting the vulnerability of flow table overflow in software-defined network. CoRR abs/1504.03095, http://arxiv.org/abs/1504.03095, 1504.03095

  • Marin E, Bucciol N, Conti M (2019) An in-depth look into SDN topology discovery mechanisms: novel attacks and practical countermeasures. In: Proceedings of ACM conference on computer and communications security (CCS), pp 1101–1114

    Google Scholar 

  • Shin S, Gu G (2013) Attacking software-defined networks: a first feasibility study. In: Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking (HotSDN), pp 165–166

    Google Scholar 

  • Sonchack J, Dubey A, Aviv AJ, Smith JM, Keller E (2016) Timing-based reconnaissance and defense in software-defined networks. In: Proceedings of the 32nd annual conference on computer security applications (ACSAC), pp 89–100

    Google Scholar 

  • Thimmaraju K, Schiff L, Schmid S (2017) Outsmarting network security with SDN teleportation. In: IEEE European symposium on security and privacy (EuroS&P), pp 563–578

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Diego Perino .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Science+Business Media LLC

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Marin, E., Perino, D. (2022). Software-Defined Network Privacy. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1744-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27739-9_1744-1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27739-9

  • Online ISBN: 978-3-642-27739-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics