Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Research Topics in Security Analysis of SDN Cloud Applications

Research Topics in Security Analysis of SDN Cloud Applications

Masters Research Topics in Security Analysis of SDN Cloud Applications

Software Defined Networking (SDN) and cloud environment have undergone some modifications as traditional data centers adopt SDN as a network management solution. The cloud networking platform provides power to configure networks cloud to determine it.

It also implements security standards, data storage, and some important files on external service providers may lead to risk. The SDN cloud applications are analyzed under some categories:

 •  EOS
 •  OpenStack
 •  Meridian
 •  CloudNaaS
 •  Microsoft Azure
 •  Zimory Cloud Suit
 •  Vmware vCloud suit
 •  HPE Virtual Cloud Network

Mitigation techniques present in the SDN cloud for some well-known threats, like,

 •  Spoofing
 •  Repudiation
 •  Tampering of data

Spoofing: Impersonation as someone else pretending to be someone or something.

Tampering data: An unauthorized change of data modifying data on a network, disk, or memory.

Repudiation: Associate with users who can deny the performing actions keeping them with no traces.

Five essential cloud characteristics are based on the SDN cloud applications such as,

 •  Demand self-service
 •  Broad network access
 •  Resource pooling
 •  Rapid elasticity
 •  Measured service

The security analysis of cloud applications could be easily bundled together, and several methods are available to examine the security of a system, such as,

 •  PASTA - attack simulation methodology
 •  UMLsec - model based approach
 •  OCTAVE - risk assessment tool
 •  CORAS - organizational purpose
 •  DREAD - risk assessment tool
 •  STRIDE - an acronym for threats
 •  Attack Tree - open source attacker
 •  Trike - threat modeling tool
 •  Misuse Cases - business process modeling tool
 •  Common Criteria - a framework for security