Export Publication

The publication can be exported in the following formats: APA (American Psychological Association) reference format, IEEE (Institute of Electrical and Electronics Engineers) reference format, BibTeX and RIS.

Export Reference (APA)
Polónio, J., Moura, J. & Marinheiro, R. N. (2024). On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review. IEEE Access. 12, 98546-98566
Export Reference (IEEE)
J. F. Polónio et al.,  "On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review", in IEEE Access, vol. 12, pp. 98546-98566, 2024
Export BibTeX
@article{polónio2024_1766509901267,
	author = "Polónio, J. and Moura, J. and Marinheiro, R. N.",
	title = "On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review",
	journal = "IEEE Access",
	year = "2024",
	volume = "12",
	number = "",
	doi = "10.1109/ACCESS.2024.3429269",
	pages = "98546-98566",
	url = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639"
}
Export RIS
TY  - JOUR
TI  - On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review
T2  - IEEE Access
VL  - 12
AU  - Polónio, J.
AU  - Moura, J.
AU  - Marinheiro, R. N.
PY  - 2024
SP  - 98546-98566
SN  - 2169-3536
DO  - 10.1109/ACCESS.2024.3429269
UR  - https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639
AB  - The discovery of security vulnerabilities and their mitigation in networked systems managed by Software-Defined Networking (SDN) are fundamental for ensuring their normal operation. The main goal of this survey was to investigate the literature on preventing system security vulnerabilities instead of detecting ongoing cyber-attacks as quickly as possible. Thus, in our opinion, organizations should fortify their systems’ security by identifying and eliminating any new security vulnerabilities before they can be successfully exploited. We comprehensively discuss different vulnerability detection approaches based on important comparison parameters such as vulnerability assessment, the SDN controller used, automation capability, system risk indicators, passive scanning and active probing of system vulnerabilities. The paper also analyzes relevant literature considering the mitigation mechanisms for discovered vulnerabilities such as the proposed SDN controller, automation capability, solution adaptation to system operational changes, risk indicators, and the solution’s impact on network quality metrics like latency and throughput. Despite the strengths of the surveyed work, we have also identified promising open issues that need further consideration by scholars, industry participants, and policymakers. We concluded that the majority of analyzed literature contributions are largely reactive in their implementation against running network threats. This suggests a new research domain for applying SDN in the automatic detection of security vulnerabilities and their proactive mitigation before external cyber-attackers can exploit them.
ER  -