Journal: |
International Journal of Neutrosophic Science
ASPG
|
Volume: |
|
Abstract: |
Software-defined networks (SDN) have developed an understanding of the technological world in recent decades,
which has led scholars to become interested in its problems. One of the primary issues facing SDN networks is
security. We discovered that ARP assaults constitute a significant threat to SDN, so we provided in this survey the
most recent solutions put forth to counteract these attacks, and rank the technical solutions based on the
neutrosophic set. The neutrosophic set is used to deal with uncertain data in the evaluation process. The
neutrosophic set is integrated with the TOPSIS method to obtain the rank of the proposed solutions. The TOPSIS
method is used to give a rank of alternatives with specified criteria. This will make it easier for future researchers
to identify and combat the three different forms of ARP attacks—ARP flooding assault, ARP spoofing attack, and
ARP broadcasting attack. Prior to that, we went into more detail on SDN networks, including their design and, in
particular, the shortcomings of the ARP protocol. Since SDN focuses on separating the controller plane from the
data plane and centralizing the controller, it differs significantly from traditional networks and has stirred
considerable controversy in the networking industry. Due to the fact that SDN is software-based, it offers greater
flexibility, scalability, programmatic management, and control. The decoupling of the control and forwarding
planes also enables SDN to connect to applications via application programming interfaces (APIs), supporting
application security and performance and resulting in a scalable and dynamic network architecture. Contrarily,
because traditional networks are hardware-based, they must use fixed functions and specialized hardware and
devices to control the network. As a result, scaling traditional networks requires purchasing new hardware, which
is a common issue. The SDN network architecture and its properties, as well as the most significant issues—
particularly the three different types of ARP attacks that affect SDN—are covered in some sections of this
research. These sections also discuss the best current remedies for these issues and outline the
|
|
|