FML: A novel forensics management layer for software defined networks

Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Ahmed Abdelaziz, Mustapha Aminu Bagiwa

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Citations (Scopus)

Abstract

The detection and protection mechanisms are not accurate enough to investigate the real source of the attack. Therefore, forensic is vital to investigate attack for identifying potential stepping stones of the attack. Software defined networks is a new evolutionary architecture for the network which suffers with numerous attacks on its early deployment phase. To investigate such attacks, this paper introduces a novel forensic layer of software defined network architecture with aim to investigate in-depth network devices and traffic at infrastructure and control tier. The proposed forensic layer “forensics management layer” can be deployed into small and large data center infrastructures because of its generalized working schema. The vertical deployment of the forensics management layer intend to investigate south, east and west bound interfaces to find root cause of the attack.
Original languageEnglish
Title of host publication6th International Conference-Cloud System and Big Data Engineering (Confluence)
PublisherIEEE
Pages619-623
Number of pages5
ISBN (Electronic)9781467382038
ISBN (Print)9781467382045
DOIs
Publication statusPublished - 15 Jan 2016
Event2016 6th International Conference on Cloud System and Big Data Engineering - Amity University, Noida, India
Duration: 14 Jan 201615 Jan 2016
https://ieeexplore.ieee.org/xpl/conhome/7503213/proceeding

Conference

Conference2016 6th International Conference on Cloud System and Big Data Engineering
Country/TerritoryIndia
CityNoida
Period14/01/1615/01/16
Internet address

Keywords

  • software defined network
  • forensics
  • vulnerabilities

Fingerprint

Dive into the research topics of 'FML: A novel forensics management layer for software defined networks'. Together they form a unique fingerprint.

Cite this