𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

SDN and NFV Security: Security Analysis of Software-Defined Networking and Network Function Virtualization

✍ Scribed by Rahamatullah Khondoker (eds.)


Publisher
Springer International Publishing
Year
2018
Tongue
English
Leaves
141
Series
Lecture Notes in Networks and Systems 30
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book provides security analyses of several Software Defined Networking (SDN) and Network Functions Virtualization (NFV) applications using Microsoft’s threat modeling framework STRIDE.

Before deploying new technologies in the production environment, their security aspects must be considered. Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two new technologies used to increase e.g. the manageability, security and flexibility of enterprise/production/cloud IT environments.

Also featuring a wealth of diagrams to help illustrate the concepts discussed, the book is ideally suited as a guide for all IT security professionals, engineers, and researchers who need IT security recommendations on deploying SDN and NFV technologies.

✦ Table of Contents


Front Matter ....Pages i-xvii
Security Analysis of SDN Routing Applications (Anagha Anilkumar Sagare, Rahamatullah Khondoker)....Pages 1-17
Security Analysis of SDN Cloud Applications (Ankush Chikhale, Rahamatullah Khondoker)....Pages 19-38
Security Analysis of SDN Applications for Big Data (Parvez Ahmad, Sven Jacob, Rahamatullah Khondoker)....Pages 39-55
Security Analysis of SDN WiFi Applications (David Artmann, Rahamatullah Khondoker)....Pages 57-71
Security Analysis for the Middleware Assurance Substrate (Timm Lippert, Rahamatullah Khondoker)....Pages 73-83
Security Analysis of FloodLight, ZeroSDN, Beacon and POX SDN Controllers (Qamar Ilyas, Rahamatullah Khondoker)....Pages 85-98
Analysis of SDN Applications for Smart Grid Infrastructures (Marco BrΓ€uning, Rahamatullah Khondoker)....Pages 99-110
Security Analysis of SDN WAN Applicationsβ€”B4 and IWAN (Rajat Jain, Rahamatullah Khondoker)....Pages 111-127
Back Matter ....Pages 129-134

✦ Subjects


Computational Intelligence


πŸ“œ SIMILAR VOLUMES


SDN and NFV Simplified: A Visual Guide t
✍ Jim Doherty πŸ“‚ Library πŸ“… 2016 πŸ› Addison-Wesley Professional 🌐 English

<P style="MARGIN: 0px">A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization</P> <P style="MARGIN: 0px">Β </P> <P style="MARGIN: 0px"> <B>The simple, visual, at-a-glance guide to SDN and NFV: Core concepts, business drivers, key technologies, and more!</B> </

Innovations in Software-Defined Networki
✍ Ankur Dumka (editor) πŸ“‚ Library πŸ“… 2018 πŸ› Engineering Science Reference 🌐 English

<span>The advancement of technology is a standard of modern daily life, whether it be the release of a new cellphone, computer, or a self-driving car. Due to this constant advancement, the networks on which these technologies operate must advance as well. Innovations in Software-Defined Networking a

Software Networks: Virtualization, SDN,
✍ Guy Pujolle πŸ“‚ Library πŸ“… 2015 πŸ› Wiley-ISTE 🌐 English

<p>The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of vir

Software Networks: Virtualization, SDN,
✍ Guy Pujolle πŸ“‚ Library πŸ“… 2015 πŸ› Wiley 🌐 English

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtua

Software-defined networking and security
✍ Chowdhary, Ankur; Huang, Dijiang; Pisharody, Sandeep πŸ“‚ Library πŸ“… 2018 πŸ› CRC Press/Taylor & Francis Group 🌐 English

"This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense. Before implementing proactive cyber defense techniques, or Moving Target Defense schemes, it's important to analyze the threats, detect attacks, and implement countermeasures, while still preserving user exper