Exportar Publicação

A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.

Exportar Referência (APA)
Polónio, J., Moura, J. & Marinheiro, R. N. (2024). On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review. IEEE Access. 12, 98546-98566
Exportar Referência (IEEE)
J. F. Polónio et al.,  "On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review", in IEEE Access, vol. 12, pp. 98546-98566, 2024
Exportar BibTeX
@article{polónio2024_1722098216392,
	author = "Polónio, J. and Moura, J. and Marinheiro, R. N.",
	title = "On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review",
	journal = "IEEE Access",
	year = "2024",
	volume = "12",
	number = "",
	doi = "10.1109/ACCESS.2024.3429269",
	pages = "98546-98566",
	url = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639"
}
Exportar RIS
TY  - JOUR
TI  - On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review
T2  - IEEE Access
VL  - 12
AU  - Polónio, J.
AU  - Moura, J.
AU  - Marinheiro, R. N.
PY  - 2024
SP  - 98546-98566
SN  - 2169-3536
DO  - 10.1109/ACCESS.2024.3429269
UR  - https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639
AB  - The discovery of security vulnerabilities and their mitigation in networked systems managed by Software-Defined Networking (SDN) are fundamental for ensuring their normal operation. The main goal of this survey was to investigate the literature on preventing system security vulnerabilities instead of detecting ongoing cyber-attacks as quickly as possible. Thus, in our opinion, organizations should fortify their systems’ security by identifying and eliminating any new security vulnerabilities before they can be successfully exploited. We comprehensively discuss different vulnerability detection approaches based on important comparison parameters such as vulnerability assessment, the SDN controller used, automation capability, system risk indicators, passive scanning and active probing of system vulnerabilities. The paper also analyzes relevant literature considering the mitigation mechanisms for discovered vulnerabilities such as the proposed SDN controller, automation capability, solution adaptation to system operational changes, risk indicators, and the solution’s impact on network quality metrics like latency and throughput. Despite the strengths of the surveyed work, we have also identified promising open issues that need further consideration by scholars, industry participants, and policymakers. We concluded that the majority of analyzed literature contributions are largely reactive in their implementation against running network threats. This suggests a new research domain for applying SDN in the automatic detection of security vulnerabilities and their proactive mitigation before external cyber-attackers can exploit them.
ER  -