Implementation of Protection Protocols for Security Threats in SDN

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Software-defined network (SDN) is designed to make the central network more efficient and improve the control network. Its architecture is fully controlled designed and configured as programmable. The controller of SDN controls the entire network of SDN. In this chapter, some SDN protocols are implemented to reduce security risks. So many devices are launched in the market with the new technology as per the requirement of the new era. SDN gives more benefits due to centralized control and network control programmability. The simple network uses switch and routers to manage all the client requests as a centralized network. To identify the fake links and requests by sending SPV (Stealthy Probing Verification) packets. Sometimes, it detects the fake links but does not detect them all the time.

Cite

CITATION STYLE

APA

Dhanoa, A. S. (2022). Implementation of Protection Protocols for Security Threats in SDN. In Internet of Things (pp. 247–255). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-89328-6_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free