Exportar Publicação
A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.
Polónio, J., Moura, J. & Marinheiro, R. N. (2024). On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review. IEEE Access. 12, 98546-98566
J. F. Polónio et al., "On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review", in IEEE Access, vol. 12, pp. 98546-98566, 2024
@article{polónio2024_1732212760373, author = "Polónio, J. and Moura, J. and Marinheiro, R. N.", title = "On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review", journal = "IEEE Access", year = "2024", volume = "12", number = "", doi = "10.1109/ACCESS.2024.3429269", pages = "98546-98566", url = "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639" }
TY - JOUR TI - On the road to proactive vulnerability analysis and mitigation leveraged by Software Defined Networks: A systematic review T2 - IEEE Access VL - 12 AU - Polónio, J. AU - Moura, J. AU - Marinheiro, R. N. PY - 2024 SP - 98546-98566 SN - 2169-3536 DO - 10.1109/ACCESS.2024.3429269 UR - https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639 AB - The discovery of security vulnerabilities and their mitigation in networked systems managed by Software-Defined Networking (SDN) are fundamental for ensuring their normal operation. The main goal of this survey was to investigate the literature on preventing system security vulnerabilities instead of detecting ongoing cyber-attacks as quickly as possible. Thus, in our opinion, organizations should fortify their systems’ security by identifying and eliminating any new security vulnerabilities before they can be successfully exploited. We comprehensively discuss different vulnerability detection approaches based on important comparison parameters such as vulnerability assessment, the SDN controller used, automation capability, system risk indicators, passive scanning and active probing of system vulnerabilities. The paper also analyzes relevant literature considering the mitigation mechanisms for discovered vulnerabilities such as the proposed SDN controller, automation capability, solution adaptation to system operational changes, risk indicators, and the solution’s impact on network quality metrics like latency and throughput. Despite the strengths of the surveyed work, we have also identified promising open issues that need further consideration by scholars, industry participants, and policymakers. We concluded that the majority of analyzed literature contributions are largely reactive in their implementation against running network threats. This suggests a new research domain for applying SDN in the automatic detection of security vulnerabilities and their proactive mitigation before external cyber-attackers can exploit them. ER -