Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.2.393

Unauthorized Software Blocking Techniques in Software Defined Network (SDN) Environments  

Kang, Nam-Gil (Korea National Defense University)
Kwon, TaeWook (Korea National Defense University)
Abstract
In a situation where an unauthorized SW brought into the organization without being authorized is emerging as a threat to the network security, the security of the network based on the SDN(Software-Defined Network) can be strengthened through the development of the security application considering the organization's characteristics. Security technology of existing SDN environment has been studied to protect internal network from external networks such as firewalls and Intrusion Detection Systems, but the research for resolving insider threat was insufficient. Therefore, We propose a system that protects the internal network from unauthorized SW, which is one of the insider threats in the SDN environment.
Keywords
SDN; NAC; Network security; Unathorized SW;
Citations & Related Records
연도 인용수 순위
  • Reference
1 BSA Global Software Survey, "Software Management: Security Imperative, Business Opportunity," https://www.bsa.org/-/media/Files/StudiesDownload/2018_BSA_GSS_Report_en.pdf, Jun. 2018
2 Lee, Bum-Chul, Yang, Hee-Hee, and Byung-Sun Lee, "SDN / NFV / Cloud Trends", Electronic Telecommunications Trends Vol. 30, No. 1, pp.88-90, Feb. 2015
3 Seungwon Shin and Guofei Gu. "CloudWatcher:Network Security Monitoring Using Openflow in Dynamic Cloud Networks", Proceedings of the ICNP affiliated 7th Workshop on Secure Network Protocols(ICNP-NPSec), Oct. 2012
4 Alsmadi I.M. and AlEroud A., "SDN-Based Real-Time IDS/IPS Alerting System," Information Fusion for Cyber-Security Analytics, vol. 691, pp. 297-306, Oct. 2016.   DOI
5 Why hackers are targeting small businesses, ITWorld, http://www.itworld.co.kr/insight/91446, Jan. 16 2015(Oct. 17 2018)
6 'Gartner's Network Access Control Model', Gartner, Lawrence Orans, Aug. 2005