METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK

Authors

  • Liudmyla Savytska Vinnytsya national technical university, Vinnytsia
  • Tetiana Korobeinikova National university “Lvivska Politechnika”
  • Ihor Leontiev Vinnytsya national technical university, Vinnytsia
  • Serhii Bohomolov Vinnytsya national technical university, Vinnytsia

DOI:

https://doi.org/10.31649/1999-9941-2023-58-3-41-52

Keywords:

SDN network, SDN Semantic Model, network operating system interaction model and SDN, network model with flexible resources, computer network

Abstract

Abstract. The work is dedicated to the analysis and improvement of methods and tools for building the architecture of software-defined networks (SDNs). A crucial aspect involves comparing the differences between network management using traditional methods and utilizing an SDN controller. Primary attention is given to the development of security models based on software-defined networks.The research is grounded in the analysis of specific cases involving the use of such networks, including gathering opinions and expert assessments from professionals in the field. It leverages publicly available information on methods and tools for securing the architecture of software-defined networks. SDN technology provides greater flexibility and speed in implementing security measures, allowing real-time responses to threats. In contemporary conditions, where cyber threats are becoming more complex and pronounced, SDN networks enable the detection of attacks, blocking malicious actions, and applying security policies in real-time. However, the increasing complexity of cyber threats and constant technological changes necessitate further development and enhancement of the information security of SDN network resources for companies. There is a need for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks. The necessity for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks serves as the foundation for this research. As a result, an enhancement in the level of information security for SDN network resources has been achieved by: 1) reducing the intervention time in the network; 2) applying an improved method of traffic processing based on network security of packet flows, allowing desired network applications to efficiently manage forwarding.

Author Biographies

Liudmyla Savytska , Vinnytsya national technical university, Vinnytsia

PhD, associate professor of computing engineering department, Vinnytsya national technical university, Vinnytsya

Tetiana Korobeinikova , National university “Lvivska Politechnika”

PhD, associate professor of information technology security department, National university “Lvivska Politechnika”

Ihor Leontiev , Vinnytsya national technical university, Vinnytsia

magister of computing engineering department, Vinnytsya national technical university, department of the computer engineering, Vinnytsy

Serhii Bohomolov , Vinnytsya national technical university, Vinnytsia

PhD, associate professor of computing engineering department, Vinnytsya national technical university, Vinnytsya

References

Todd M. S., Rahman S. M. Complete Network Security Protection for Sme’s Within Limited Resources. International Journal of Network Security & Its Applications (IJNSA). 2013. Vol. 5, no. 6.

Alqahtani H. S. Latest Trends and Future Directions of Cyber Security Information Systems. Journal of Information Engineering and Applications. 2016. Vol. 6, no. 11.

Троян С. О. Захист інформаційних ресурсів. Умань, 2012. 120 с.

Медяник A. Інформаційна безпека та методи захисту інформації. 2020.

Simmons A. Software-Defined Networking (SDN) Explained. Dgtl Infra. URL: https://dgtlinfra.com/software-defined-networking-sdn/.

Ot A. The Software-Defined Networking (SDN) Market in 2022 | Enterprise Storage Forum. Enterprise Storage Forum. URL: https://www.enterprisestorageforum.com/networking/software-defined-networking-market/.

Software-Defined Networking: Challenges and research opportunities for Future Internet / A. Hakiri et al. Computer Networks. 2014. Vol. 75. P. 453–471. URL: https://doi.org/10.1016/j.comnet.2014.10.015.

Ashton, Metzler. The Business Case for Deploying SDN in Enterprise Networks. Leverage technology & talent for success.

Gray K., Nadeau T. D. SDN: Software Defined Networks. Sebastopol : O’Reilly Media, Inc, 2013.

Brief About What does The Future hold for Software Defined Networking (SDN). YourTechDiet. URL: https://yourtechdiet.com/blogs/sdn-future/.

SD-LAN vs LAN – What Are The Key Differences?. Extreme Marketing Team. URL: https://www.extremenetworks.com/extreme-networks-blog/sd-lan-vs-lan-what-are-the-key-differences/.

Селюков О. В. Забезпечення стандартизації параметрів управління для SDN архітектури при надійній передавання інформації / О. В. Селюков, Ю. В. Хмельницький, В.М. Лоза, Р.В. Бойко // Збірник наукових праць Військового інституту Київського національного університету імені Тараса. – 2018. – С. 134–145.

Управління телекомунікаціями із застосуванням новітніх технологій / Кривуца, Стеклов, Беркман та ін.]., 2007. – 384 с. – (Підручник для ВНЗ).

Комп’ютерні мережі: навч. посібник / Т. І. Коробейнікова, С. М. Захарченко. – Львів: Видавництво Львівської політехніки, 2022. – 228 с.

Комп’ютерні мережі:[навчальний посібник] / А. Г.Микитишин, М. М. Митник, П. Д. Стухляк, В. В. Пасічник. – Львів: Магнолія 2006, 2013. – 256 с.

Коробейнікова Т.І. Розгляд архітектури програмно-керованих мереж / Коробейнікова Т.І., Калько Т.С., Лужецька Н. М. // International scientific journal «Grail of Science» – 2023. – № 23 (May, 2023). – С. 228–237. ISSN: 2710–3056. ISBN 979-8-88955-791-3. https://doi.org/10.36074/grail-of-science.09.06.2023.36

Кононенко А. В. Концепція software-defined-networking та основні принципи openflow / А. В. Кононенко, І. М. Кучма, М. В. Перетятько, В. О. Кацалап, Д. О. Размислов // Наукові записки Українського науково-дослідного інституту зв’язку. – 2018. - № 3. – С. 51-58.

Савицька Л.А., Коробейнікова Т.І. Удосконалений метод розробки АРІ підвищеної швидкодії Інформаційні технології та комп`ютерна інженерія 2021: - №1 (50). – С. 31–35

Савицька Л. А. Програмний модуль попереднього діагностування пацієнтів на основі нейронної мережі Кохонена [Текст] / Л. А. Савицька, Н. В. Добровольська, В. О. Кондратюк // Інформаційні технології та комп`ютерна інженерія. – 2023. – № 1. – С. 66-74.

References

Todd M. S., Rahman S. M. Complete Network Security Protection for Sme's Within Limited Resources. International Journal of Network Security & Its Applications (IJNSA). 2013. Vol. 5, no. 6.

Alqahtani H. S. Latest Trends and Future Directions of Cyber Security Information Systems. Journal of Information Engineering and Applications. 2016. Vol. 6, no. 11.

Troyan S. O. Zakhyst informatsiynykh resursiv. Umanʹ, 2012. 120 s.

Medyanyk A. Informatsiyna bezpeka ta metody zakhystu informatsiyi. 2020.

Simmons A. Software-Defined Networking (SDN) Explained. Dgtl Infra. URL: https://dgtlinfra.com/software-defined-networking-sdn/.

Ot A. The Software-Defined Networking (SDN) Market in 2022 | Enterprise Storage Forum. Enterprise Storage Forum. URL: https://www.enterprisestorageforum.com/networking/software-defined-networking-market/.

Software-Defined Networking: Challenges and research opportunities for Future Internet / A. Hakiri et al. Computer Networks. 2014. Vol. 75. P. 453–471. URL: https://doi.org/10.1016/j.comnet.2014.10.015.

Ashton, Metzler. The Business Case for Deploying SDN in Enterprise Networks. Leverage technology & talent for success.

Gray K., Nadeau T. D. SDN: Software Defined Networks. Sebastopol : OʺReilly Media, Inc, 2013.

Brief About What does The Future hold for Software Defined Networking (SDN). YourTechDiet. URL: https://yourtechdiet.com/blogs/sdn-future/.

SD-LAN vs LAN – What Are The Key Differences?. Extreme Marketing Team. URL: https://www.extremenetworks.com/extreme-networks-blog/sd-lan-vs-lan-what-are-the-key-differences/.

Selyukov O. V. Zabezpechennya standartyzatsiyi parametriv upravlinnya dlya SDN arkhitektury pry nadiyniy peredavannya informatsiyi / O. V. Selyukov, YU. V. Khmelʹnytsʹkyy, V.M. Loza, R.V. Boyko // Zbirnyk naukovykh pratsʹ Viysʹkovoho instytutu Kyyivsʹkoho natsionalʹnoho universytetu imeni Tarasa. – 2018. – S. 134–145.

Upravlinnya telekomunikatsiyamy iz zastosuvannyam novitnikh tekhnolohiy / Kryvutsa, Steklov, Berkman ta in.]., 2007. – 384 s. – (Pidruchnyk dlya VNZ).

Komp'yuterni merezhi: navch. posibnyk / T. I. Korobey̆nikova, S. M. Zakharchenko. – Lʹviv: Vydavnytstvo Lʹvivsʹkoï politekhniky, 2022. – 228 s.

Kompʺyuterni merezhi:[navchalʹnyy posibnyk] / A. H.Mykytyshyn, M. M. Mytnyk, P. D. Stukhlyak, V. V. Pasichnyk. – Lʹviv: Mahnoliya 2006, 2013. – 256 s.

Korobeynikova T.I. Roz·hlyad arkhitektury prohramno-kerovanykh merezh / Korobeynikova T.I., Kalʹko T.S., Luzhetsʹka N. M. // International scientific journal «Grail of Science» – 2023. – № 23 (May, 2023). – S. 228–237. ISSN: 2710–3056. ISBN 979-8-88955-791-3. https://doi.org/10.36074/grail-of-science.09.06.2023.36

Kononenko A. V. Kontseptsiya software-defined-networking ta osnovni pryntsypy openflow / A. V. Kononenko, I. M. Kuchma, M. V. Peretyatʹko, V. O. Katsalap, D. O. Razmyslov // Naukovi zapysky Ukrayinsʹkoho naukovo-doslidnoho instytutu zvʺyazku. - 2018. - № 3. - S. 51-58.

Savytsʹka L.A., Korobeynikova T.I. Udoskonalenyy metod rozrobky ARI pidvyshchenoyi shvydkodiyi Informatsiyni tekhnolohiyi ta komp`yuterna inzheneriya 2021: - №1 (50). - S. 31–35

Savytsʹka L. A. Prohramnyy modulʹ poperednʹoho diahnostuvannya patsiyentiv na osnovi neyronnoyi merezhi Kokhonena [Tekst] / L. A. Savytsʹka, N. V. Dobrovolʹsʹka, V. O. Kondratyuk // Informatsiyni tekhnolohiyi ta komp`yuterna inzheneriya. – 2023. – № 1. – S. 66-74.

Downloads

Abstract views: 200

Published

2023-12-29

How to Cite

[1]
L. . Savytska, T. . Korobeinikova, I. . Leontiev, and S. . Bohomolov, “METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK”, ІТКІ, vol. 58, no. 3, pp. 41–52, Dec. 2023.

Metrics

Downloads

Download data is not yet available.

Most read articles by the same author(s)