Penetration Testing for Software Defined Networks against DOS Attack

International Journal of Computer Science and Engineering
© 2016 by SSRG - IJCSE Journal
Volume 3 Issue 8
Year of Publication : 2016
Authors : N.Priyanka, Dr.V.Vetriselvi

pdf
How to Cite?

N.Priyanka, Dr.V.Vetriselvi, "Penetration Testing for Software Defined Networks against DOS Attack," SSRG International Journal of Computer Science and Engineering , vol. 3,  no. 8, pp. 10-13, 2016. Crossref, https://doi.org/10.14445/23488387/IJCSE-V3I8P102

Abstract:

 Penetration test is a great way to identify vulnerabilities in SDN network and DOS Mitigation can be done by identifying the attacks. Penetration testing is a specialized security auditing method where a tester manually creates attacks on software defined network. This test usually involves the use of attacking methods conducted by trusted individuals called penetration tester that are conducted in a similar manner as practiced by hostile intruders or hackers. The goal of this penetration testing is to identify attack surfaces, vulnerabilities, and other weaknesses from the perspective of an attacker. This is the most effective way to exploit and to prove that the network is vulnerable. Penetration testing allows the security analyst to find new vulnerabilities which is certified as highly secure. In this paper, we proposed penetration testing to identify vulnerabilities in software Defined Networks. Penetration Testing is more important and it is mandatory for every system or network in order make the system or network more robust.

Keywords:

Vulnerabilities, Penetration Testing, Security measures and attacker.

References:

[1] Amiya Nayak,Li,Peng Li and song Guo,”Byzantine-Resilient Secure Software Defined Networks with multiple controllers in cloud”,IEEE Transactions on cloud computing,Vol.2,No.4,pp.436-447, 2014.
[2] A.Bechtsoudis and N.Sklavos,Aiming at higher network security through extensive penetration tests.Latin America Transactions,IEEE(Revista IEEEAmaerica Latina)10(3):pp.1752-1756 , 2012.
[3] A.R.Curtis et al,”Devoflow:Scaling Flow Management for High-Performance Networks,”Proc. ACM SIGCOMM’11,New York,NY, pp. 254-65,2011.
[4] Chen.X,N.Zhu,Y.Zhang, and S.Xin,”Design and application of penetration attack tree model oriented to attack resistance test”,computer science and software engineering,2008 International conference ,pp.622-626,2008.
[5] H.Kim,N.Feamster, ”Improving network management with software defined networking”,IEEE communication.Mag.,vol.51,no.2,pp.114-119,2013
[6] ONF White paper.Software Defined Networking.The New Norm for Networks[EB/OL].2012.https://www.opennetworking.org/ 
[7] Teemu Koponen,Casado Martin,Scott Shenker,Amin Tootoonchian Fabric:on Evolving SDN.In HotSDN 2012.
[8] T.koponen, M.casado, N.gude, J.Stribling, L.Poutievski, M.Zhu, R.Ramanathan, Y.Iwara, H.Inoue, T.Hama and S.Shenker(2010), Onix:a distributed control platform for large-scale production networks. In Proceedings of the 9th USENIX conference on operating systems design and implementation, OSDI’10, Pages16,Berkeley, CA, USA, 2010.USENIX.
[9] Xuan Nam Nguyen, Bruno Nunes, Marc Mendonca, K.Obraczka, and T.Turletti(2014),“A survey of softwaredefined networking: Past, present, future of programmable networks,”Communications Surveys Tutorials”,IEEE,vol.16,no.3,pp.1617-1634,Third 2014.