A Literature Review of Denial of Service Attacks in SDN Security
VerifiedAdded on 2021/05/30
|14
|4765
|62
Literature Review
AI Summary
This literature review delves into the realm of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, exploring their impact on network security, particularly within Software Defined Networking (SDN) environments. It identifies challenges such as the complexity of network processes, lack of expert knowledge, and accessibility issues. The review covers several key articles, including analyses of DoS attack mechanisms, real-time detection methods in vehicular networks, security considerations in SDN architectures, and the vulnerabilities introduced by cloud computing integration. Gaps in the literature are highlighted, focusing on areas inadequately addressed, such as specific countermeasures and the evolving landscape of SDN security threats. The review concludes by suggesting future research directions, emphasizing the need for enhanced security protocols and proactive defense strategies to mitigate the risks posed by DoS and DDoS attacks in modern network infrastructures. This document is available on Desklib, a platform offering study tools and solved assignments for students.

Denial of Service and Distributed Denial of Service
Attacks
Attacks
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Abstract
Denial of Service (DoS) and Distributed Denial of Service (DDoS) are both different forms
of extreme threats that can have a major effect on a network. These are important threats that
are targeted by hackers and need to be detected and eliminated before any major impact. The
latest developments in networking by introducing Software Defined Networking (SDN) has
brought about a robust security features against DoS and DDoS but that is still not capable
enough. There have been certain problems that have appeared regarding Cloud Computing
which has turned out to be a vulnerable area for individual network and require to be tackled
on that basis. The study tries to identify recent literatures on these issues, recognize gaps and
provide future recommendations in this respect.
Key words: Denial of service, Distributed denial of service, Software Defined Networking
Denial of Service (DoS) and Distributed Denial of Service (DDoS) are both different forms
of extreme threats that can have a major effect on a network. These are important threats that
are targeted by hackers and need to be detected and eliminated before any major impact. The
latest developments in networking by introducing Software Defined Networking (SDN) has
brought about a robust security features against DoS and DDoS but that is still not capable
enough. There have been certain problems that have appeared regarding Cloud Computing
which has turned out to be a vulnerable area for individual network and require to be tackled
on that basis. The study tries to identify recent literatures on these issues, recognize gaps and
provide future recommendations in this respect.
Key words: Denial of service, Distributed denial of service, Software Defined Networking

Table of Contents
Overview of the technology involved........................................................................................4
Technologies and Applications..................................................................................................5
Challenges and problems in the chosen research area...............................................................5
Literature Review.......................................................................................................................6
Identification of any gaps in the literature.................................................................................6
Discussing areas/issues that have been addressed in the current literature............................6
Journal 1 - Denial of Service by Sean‐Philip Oriyano........................................................6
Journal 2 - Real-time detection of Denial-of-Service attacks in IEEE 802.11p vehicular
networks by Nikita Lyamin, Alexey Vinel, Magnus Jonsson and Jonathan Loo...............6
Journal 3- A Survey of Security in Software Defined Networks by Sandra Scott-
Hayward, Sriram Natarajan and Sakir Sezer......................................................................7
Journal 4- Distributed Denial of Service Attacks in Software-Defined Networking with
Cloud Computing by Qiao Yan and F. Richard Yu............................................................7
Journal 5- Securing Software Defined Networks by Adnan Akhunzada...........................8
Highlighting areas/issues that have not been addressed or adequately addressed.................8
Journal 1..............................................................................................................................8
Journal 2..............................................................................................................................8
Journal 3..............................................................................................................................9
Journal 4..............................................................................................................................9
Journal 5..............................................................................................................................9
Discussing on view on the issue.............................................................................................9
Journal 1..............................................................................................................................9
Journal 2..............................................................................................................................9
Journal 3............................................................................................................................10
Journal 4............................................................................................................................10
Journal 5............................................................................................................................10
Overview of the technology involved........................................................................................4
Technologies and Applications..................................................................................................5
Challenges and problems in the chosen research area...............................................................5
Literature Review.......................................................................................................................6
Identification of any gaps in the literature.................................................................................6
Discussing areas/issues that have been addressed in the current literature............................6
Journal 1 - Denial of Service by Sean‐Philip Oriyano........................................................6
Journal 2 - Real-time detection of Denial-of-Service attacks in IEEE 802.11p vehicular
networks by Nikita Lyamin, Alexey Vinel, Magnus Jonsson and Jonathan Loo...............6
Journal 3- A Survey of Security in Software Defined Networks by Sandra Scott-
Hayward, Sriram Natarajan and Sakir Sezer......................................................................7
Journal 4- Distributed Denial of Service Attacks in Software-Defined Networking with
Cloud Computing by Qiao Yan and F. Richard Yu............................................................7
Journal 5- Securing Software Defined Networks by Adnan Akhunzada...........................8
Highlighting areas/issues that have not been addressed or adequately addressed.................8
Journal 1..............................................................................................................................8
Journal 2..............................................................................................................................8
Journal 3..............................................................................................................................9
Journal 4..............................................................................................................................9
Journal 5..............................................................................................................................9
Discussing on view on the issue.............................................................................................9
Journal 1..............................................................................................................................9
Journal 2..............................................................................................................................9
Journal 3............................................................................................................................10
Journal 4............................................................................................................................10
Journal 5............................................................................................................................10

Future Directions......................................................................................................................10
References................................................................................................................................12
References................................................................................................................................12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Overview of the technology involved
The overview of the technology that has been studied in this report is the security that is
provided in the network structure of an organization, generally against two major attacks
which the DoS and DDoS (Xu, et al., 2014). The Denial of Service (DoS) is a kind of attack
that occurs when the user of a specific programme or network is denied of using that set of
networks even though he/she provides all the useful information required to give him/her the
access to the said network (Laybats & Tredinnick, 2016). This refers to an attack wherein an
individual is targeted and the computer programme is controlled by a third-party who restricts
the access of the general user.
(DDoS) is a kind of service attack that occurs when an group of machines is targeted together
in a manner so that there is an extreme form of denial of service throughout the entire
network. This is a specialised form as the same attack is redistributed to different sectors and
hence has a large-scale effect to it (Garba et al., 2015).
Technologies and Applications
Generally, it is difficult to understand how a DoS and DDoS attack occurs and how it can
impact a network. It has been identified that generally DoS and DDoS attack takes place bt
flooding the entire system by target messages, malicious packages and other requests which
will end up slowing down the system (Conklin, et al., 2015). There would be occasions when
the user would require to shut down the system and it is during this period that the different
forms of the DoS services try to access and take control over the system of the network and
the applications attached to the same network. In general, there has been a call for different
forms of security applications and features to be put into these areas so that one could
encourage and make certain changes in this aspect of the technology and create a way to
detect and eliminate any form of DoS or DDoS attack before it can have any impact on the
system. Hence, the system network used for this report is the Software Defined Network
(SDN) which is a new form of network designed through an integration of software and
physical network components, but along with that, it has been seen to be effective is securing
a machine against any form of external third-party intrusions (Siponen, et al., 2014). Also,
the cloud connectivity has been undertaken in these areas and there has been an effect
regarding the way this cloud system is vulnerable to the DoS and DDoS and therefore, there
has been a research done to this effect to find out the security features of cloud systems.
The overview of the technology that has been studied in this report is the security that is
provided in the network structure of an organization, generally against two major attacks
which the DoS and DDoS (Xu, et al., 2014). The Denial of Service (DoS) is a kind of attack
that occurs when the user of a specific programme or network is denied of using that set of
networks even though he/she provides all the useful information required to give him/her the
access to the said network (Laybats & Tredinnick, 2016). This refers to an attack wherein an
individual is targeted and the computer programme is controlled by a third-party who restricts
the access of the general user.
(DDoS) is a kind of service attack that occurs when an group of machines is targeted together
in a manner so that there is an extreme form of denial of service throughout the entire
network. This is a specialised form as the same attack is redistributed to different sectors and
hence has a large-scale effect to it (Garba et al., 2015).
Technologies and Applications
Generally, it is difficult to understand how a DoS and DDoS attack occurs and how it can
impact a network. It has been identified that generally DoS and DDoS attack takes place bt
flooding the entire system by target messages, malicious packages and other requests which
will end up slowing down the system (Conklin, et al., 2015). There would be occasions when
the user would require to shut down the system and it is during this period that the different
forms of the DoS services try to access and take control over the system of the network and
the applications attached to the same network. In general, there has been a call for different
forms of security applications and features to be put into these areas so that one could
encourage and make certain changes in this aspect of the technology and create a way to
detect and eliminate any form of DoS or DDoS attack before it can have any impact on the
system. Hence, the system network used for this report is the Software Defined Network
(SDN) which is a new form of network designed through an integration of software and
physical network components, but along with that, it has been seen to be effective is securing
a machine against any form of external third-party intrusions (Siponen, et al., 2014). Also,
the cloud connectivity has been undertaken in these areas and there has been an effect
regarding the way this cloud system is vulnerable to the DoS and DDoS and therefore, there
has been a research done to this effect to find out the security features of cloud systems.

Challenges and problems in the chosen research area
Some of the challenges that has been faced in the research area are:
Lack of Expert Knowledge: There was a lack of expert knowledge in the entire
process of network creation and network process of learning (Sommestad, et al.,
2014). The network structure of an organization is vast and it is connected in several
different way which makes it difficult to understand the chief layout of the
organizational network processes. Since the physical network is replaced by software
networking, there is a problem in that area because the chief overlay is transported
into advanced software networks which makes it difficult to understand (Safa, Von
Solms & Furnell, 2016).
Intractability and Complexity of Network processes: Since the network processes is
itself a very complex area, it was difficult to understand the network problems. Most
of the functioning of the network could not be traced back as it was lost in the web of
network processes and even when the entire organization is run on the basis of a
software defined network, it becomes impossible to trace the network because the loss
of transmission is still a part of the problem. Hence, it becomes difficult to understand
and dig deep into the complexity of network processes (Parsons, et al. 2015).
Lack of proper accessibility: As is the case with every sophisticated network setting,
there are a lot of barriers set up in the network for security reasons so that there is not
much accessibility of random people or third-party breaches. There are also
accessibility issues present by the use of barriers so that there is no internal breach
that takes place (Sommestad, Karlzén & Hallberg, 2015). As a result, there was a
problem regarding accessibility of information is this case and that posed a major
challenge in conducting the research.
Literature Review
Identification of any gaps in the literature
Discussing areas/issues that have been addressed in the current literature
Journal 1 - Denial of Service by Sean‐Philip Oriyano
In this article, there has been an overview provided on how Denial of service actually works
and what tools are used by hackers to create a successful DoS attack on a target computer. In
this article, it is stated that the DoS attack is in fact done by the hacker with a specific motive
Some of the challenges that has been faced in the research area are:
Lack of Expert Knowledge: There was a lack of expert knowledge in the entire
process of network creation and network process of learning (Sommestad, et al.,
2014). The network structure of an organization is vast and it is connected in several
different way which makes it difficult to understand the chief layout of the
organizational network processes. Since the physical network is replaced by software
networking, there is a problem in that area because the chief overlay is transported
into advanced software networks which makes it difficult to understand (Safa, Von
Solms & Furnell, 2016).
Intractability and Complexity of Network processes: Since the network processes is
itself a very complex area, it was difficult to understand the network problems. Most
of the functioning of the network could not be traced back as it was lost in the web of
network processes and even when the entire organization is run on the basis of a
software defined network, it becomes impossible to trace the network because the loss
of transmission is still a part of the problem. Hence, it becomes difficult to understand
and dig deep into the complexity of network processes (Parsons, et al. 2015).
Lack of proper accessibility: As is the case with every sophisticated network setting,
there are a lot of barriers set up in the network for security reasons so that there is not
much accessibility of random people or third-party breaches. There are also
accessibility issues present by the use of barriers so that there is no internal breach
that takes place (Sommestad, Karlzén & Hallberg, 2015). As a result, there was a
problem regarding accessibility of information is this case and that posed a major
challenge in conducting the research.
Literature Review
Identification of any gaps in the literature
Discussing areas/issues that have been addressed in the current literature
Journal 1 - Denial of Service by Sean‐Philip Oriyano
In this article, there has been an overview provided on how Denial of service actually works
and what tools are used by hackers to create a successful DoS attack on a target computer. In
this article, it is stated that the DoS attack is in fact done by the hacker with a specific motive

and a specific target which is referred to as hacktivism, and therefore, it becomes difficult to
detect such hackers since it is such a planned and premeditated attack (Ab Rahman & Choo,
2015). The article also identifies the different ways in which the DoS attack can be prevented
or a machine can be protected from such an attack (Oriyano, 2016). In general, the author
hints upon the rise of the DDoS attack as well, which is not elongated in the article, but the
author seems to put DDoS in the same category of hacktivism, with only a larger group of
targets who requires to be attacked in this case (Lowry, et al., 2015).
Journal 2 - Real-time detection of Denial-of-Service attacks in IEEE 802.11p vehicular
networks by Nikita Lyamin, Alexey Vinel, Magnus Jonsson and Jonathan Loo
This article tries to attempt to find the way any kind of DoS activity gets into the system and
the way such an attack occurs. The real-time detection takes place under controlled
environment and under certain assumptions and in a manner, it tries to identify how any
third-party hacker can take control of a system and turn it into a manner wherein they could
take control of the access (Lyamin, Vinel, Jonsson & Loo, 2014). It uses the modern IEEE
802.11p which is used in vehicles and therefore uses ‘jamming’ as a way to jam and block
any kind of DoS attack that could take place in the vehicular network. In the mathematical
probabilistic manner, the probability of the attack has been considered to be p and therefore
Two attacker models are assumed: “Random jamming” has been used wherein each packet
was transmitted in the channel is corrupted independently with probability p. The “ON-OFF
jamming” has been used as another way wherein the OFF state no packets are jammed, while
in the ON state K subsequent beacons are destroyed with probability one. Then the attacker
switches to the OFF state. The OFF–ON transitions occur at the moments of beacon
transmission start with probability p.
Journal 3- A Survey of Security in Software Defined Networks by Sandra Scott-Hayward,
Sriram Natarajan and SakirSezer
The journal identifies SDN as a programmable network and due to this factor, it has been
seen as a probable target for hackers who could programme it. This article mentions DoS and
man in the middle and how they can affect network transmission and access (Scott-Hayward,
Natarajan &Sezer, 2016). It presents the new SDN services and how the SDN service is a
good alternative to Cloud computing regarding the detection and the subsequent elimination
of the DoS services (Safa & Von Solms, (2016). The article is prepared for understanding
security in SDN which is surveyed presenting both the research community and industry
advances in this area. The Network Security is considered to be a main factor in this area and
detect such hackers since it is such a planned and premeditated attack (Ab Rahman & Choo,
2015). The article also identifies the different ways in which the DoS attack can be prevented
or a machine can be protected from such an attack (Oriyano, 2016). In general, the author
hints upon the rise of the DDoS attack as well, which is not elongated in the article, but the
author seems to put DDoS in the same category of hacktivism, with only a larger group of
targets who requires to be attacked in this case (Lowry, et al., 2015).
Journal 2 - Real-time detection of Denial-of-Service attacks in IEEE 802.11p vehicular
networks by Nikita Lyamin, Alexey Vinel, Magnus Jonsson and Jonathan Loo
This article tries to attempt to find the way any kind of DoS activity gets into the system and
the way such an attack occurs. The real-time detection takes place under controlled
environment and under certain assumptions and in a manner, it tries to identify how any
third-party hacker can take control of a system and turn it into a manner wherein they could
take control of the access (Lyamin, Vinel, Jonsson & Loo, 2014). It uses the modern IEEE
802.11p which is used in vehicles and therefore uses ‘jamming’ as a way to jam and block
any kind of DoS attack that could take place in the vehicular network. In the mathematical
probabilistic manner, the probability of the attack has been considered to be p and therefore
Two attacker models are assumed: “Random jamming” has been used wherein each packet
was transmitted in the channel is corrupted independently with probability p. The “ON-OFF
jamming” has been used as another way wherein the OFF state no packets are jammed, while
in the ON state K subsequent beacons are destroyed with probability one. Then the attacker
switches to the OFF state. The OFF–ON transitions occur at the moments of beacon
transmission start with probability p.
Journal 3- A Survey of Security in Software Defined Networks by Sandra Scott-Hayward,
Sriram Natarajan and SakirSezer
The journal identifies SDN as a programmable network and due to this factor, it has been
seen as a probable target for hackers who could programme it. This article mentions DoS and
man in the middle and how they can affect network transmission and access (Scott-Hayward,
Natarajan &Sezer, 2016). It presents the new SDN services and how the SDN service is a
good alternative to Cloud computing regarding the detection and the subsequent elimination
of the DoS services (Safa & Von Solms, (2016). The article is prepared for understanding
security in SDN which is surveyed presenting both the research community and industry
advances in this area. The Network Security is considered to be a main factor in this area and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

so, to stop the general attacks of DoS and DDoS, there has been a consideration to study and
alter architecture of SDN so that there is no channel change to detect attacks.
Journal 4- Distributed Denial of Service Attacks in Software-Defined Networking with Cloud
Computing by Qiao Yan and F. Richard Yu
The article has considered how software defined networking while bringing different new
benefits and aspects in the world of networking has become a target of distributed denial of
service (DDoS). It identifies the way in which it becomes easy for the SDN system to locate
and identify any kind DDoS attack, however, the problem occurs that for this identification
there needs to be a shift in the channel of the SDN which would make it vulnerable to
different other attacks which would be difficult to identify and would compromise the
system. The cloud system is also identified in this case and security requirements of cloud
computing include confidentiality, integrity, availability, accountability, and privacy-
preservability. Among these security requirements, availability is crucial since the core
function of cloud computing is to provide on-demand service of different levels. As a result,
Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are the main
methods to destroy the availability of cloud computing (Vithanwattana, Mapp & George,
2017). Hence, both these networking sectors are affected by DDoS and though SDN is more
capable to attacking the DDoS attacks, the article identifies it to become equally vulnerable to
other attacks (Yan & Yu, 2015). The journal traces a series of DoS attacks that has occurred
since the period when cloud computing and SDN combined to define the networking area.
Journal 5- Securing Software Defined Networks by Adnan Akhunzada
This journal is futuristic and compares with the present, past, and the future of SDN. It takes
some of its data from other items and traces the rate of increase that has taken places in DoS
and Man in the Middle problems and identifies them as Open Source discussion topics for
future remedies (Akhunzada et al, 2015). It considers SDN, first as per the claim that it does
make the network make up easier but the article focusses on the network security problem
that occurs with the SDN and the other factors. According to this article, the integrity and
security of SDNs remain unproven when it comes to the placement of management
functionality in a single centralized virtual server and this makes it vulnerable to new kinds of
attacks which includes new areas through which DoS and DDoS could attack the field. By a
taxonomical branching of all the elements of a SDN, it considers the different ways in which
the architecture can be fortified to bring about changes in the security features of the SDN
alter architecture of SDN so that there is no channel change to detect attacks.
Journal 4- Distributed Denial of Service Attacks in Software-Defined Networking with Cloud
Computing by Qiao Yan and F. Richard Yu
The article has considered how software defined networking while bringing different new
benefits and aspects in the world of networking has become a target of distributed denial of
service (DDoS). It identifies the way in which it becomes easy for the SDN system to locate
and identify any kind DDoS attack, however, the problem occurs that for this identification
there needs to be a shift in the channel of the SDN which would make it vulnerable to
different other attacks which would be difficult to identify and would compromise the
system. The cloud system is also identified in this case and security requirements of cloud
computing include confidentiality, integrity, availability, accountability, and privacy-
preservability. Among these security requirements, availability is crucial since the core
function of cloud computing is to provide on-demand service of different levels. As a result,
Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are the main
methods to destroy the availability of cloud computing (Vithanwattana, Mapp & George,
2017). Hence, both these networking sectors are affected by DDoS and though SDN is more
capable to attacking the DDoS attacks, the article identifies it to become equally vulnerable to
other attacks (Yan & Yu, 2015). The journal traces a series of DoS attacks that has occurred
since the period when cloud computing and SDN combined to define the networking area.
Journal 5- Securing Software Defined Networks by Adnan Akhunzada
This journal is futuristic and compares with the present, past, and the future of SDN. It takes
some of its data from other items and traces the rate of increase that has taken places in DoS
and Man in the Middle problems and identifies them as Open Source discussion topics for
future remedies (Akhunzada et al, 2015). It considers SDN, first as per the claim that it does
make the network make up easier but the article focusses on the network security problem
that occurs with the SDN and the other factors. According to this article, the integrity and
security of SDNs remain unproven when it comes to the placement of management
functionality in a single centralized virtual server and this makes it vulnerable to new kinds of
attacks which includes new areas through which DoS and DDoS could attack the field. By a
taxonomical branching of all the elements of a SDN, it considers the different ways in which
the architecture can be fortified to bring about changes in the security features of the SDN

construction (Layton, 2016). Different ways to protect SDN from DoS and DDoS attacks
have also been suggested in this article.
Highlighting areas/issues that have not been addressed or adequately addressed
Journal 1
This journal effectively identified the tools which the hackers use to make an effect by the
DoS attack and in this manner, the journal has tried to find the purpose which the hackers use
to target specified sets of computers or networks to make the DoS attack possible. However,
the issue this journal fails to address is DDoS and its effect on cloud computing and SDN as
it skims over this issue, attaching it to the detailed study of DDoS (Gordon, et al., 2015).
Journal 2
This journal is an effective way in which real-time detection of DoS attack is recorded and by
the use of this study, it could be identified how certain aspects of DoS works in the breaching
of a system and taking over of the same in the process (Mayadunne & Park, 2016). However,
the journal is made by making assumptions on the process and there is a controlled situation
under which the entire process works, and so considering these effects, there is a lack of real
situation basis on the study. The study also concludes stating this problem in the journal
itself.
Journal 3
The journal aims to show how hackers have the ability to make use of certain access points to
make changes in an organization network system, especially by working into the network
elements of the network system (Teh, Ahmed & D'Arcy, 2015). It shows the working of DoS
and Man in the Middle and hence is an improvement but it fails to show how the DoS and
Man in the Middle work and intercept communication or transmission and how it could be
altered.
Journal 4
The journal introduces the concept of cloud computing and makes some changes in the cloud
features by putting in the way in which cloud affects SDN. But the journal typifies all kinds
of cloud breaches under the subheading of leaks and therefore, that results in the journal
being very limited in scope and has not the aspect of futuristic in it.
Journal 5
The journal has been introduced to bring up the future aspects of the SDN networks. While
the journal does bring in the actual security issues in the world connected to cloud computing,
have also been suggested in this article.
Highlighting areas/issues that have not been addressed or adequately addressed
Journal 1
This journal effectively identified the tools which the hackers use to make an effect by the
DoS attack and in this manner, the journal has tried to find the purpose which the hackers use
to target specified sets of computers or networks to make the DoS attack possible. However,
the issue this journal fails to address is DDoS and its effect on cloud computing and SDN as
it skims over this issue, attaching it to the detailed study of DDoS (Gordon, et al., 2015).
Journal 2
This journal is an effective way in which real-time detection of DoS attack is recorded and by
the use of this study, it could be identified how certain aspects of DoS works in the breaching
of a system and taking over of the same in the process (Mayadunne & Park, 2016). However,
the journal is made by making assumptions on the process and there is a controlled situation
under which the entire process works, and so considering these effects, there is a lack of real
situation basis on the study. The study also concludes stating this problem in the journal
itself.
Journal 3
The journal aims to show how hackers have the ability to make use of certain access points to
make changes in an organization network system, especially by working into the network
elements of the network system (Teh, Ahmed & D'Arcy, 2015). It shows the working of DoS
and Man in the Middle and hence is an improvement but it fails to show how the DoS and
Man in the Middle work and intercept communication or transmission and how it could be
altered.
Journal 4
The journal introduces the concept of cloud computing and makes some changes in the cloud
features by putting in the way in which cloud affects SDN. But the journal typifies all kinds
of cloud breaches under the subheading of leaks and therefore, that results in the journal
being very limited in scope and has not the aspect of futuristic in it.
Journal 5
The journal has been introduced to bring up the future aspects of the SDN networks. While
the journal does bring in the actual security issues in the world connected to cloud computing,

it fails to bring in the way in which the security features could be tackled (Fraunholz, et al.,
2017). It is just an awareness journal rather than a problem-solving one. It has also focused
more on the taxonomic divisions of SDN architecture and has not concentrated much on the
effects of cloud computing and provided more open-ended areas in respect to the security of
cloud systems.
Discussing on view on the issue
Journal 1
This journal is a proper description and introduction to the technique and network tools that
are used by the different hackers to make an attempt into the network or system of targeted
individuals. In general, this journal has the good points of making an analysis into the
different ways of the breach to occur along with the different psychological implications
behind any attack that the attacker may implement. However, there is not much diversity in
this article and there are no experiments done in this case.
Journal 2
In this journal, while the real-time detection has been done, there has been many assumptions
that have been used in this case. Also, the report has only used the study for the breaching
system into vehicular networks under controlled environments, and the same could not be
used for the different other networks in companies. This journal also has not provided much
evidence on the basis of experiments but have only used certain elements out of their study in
the processes used which are limiting. No penetration testing has been done to engage into a
comparative analysis.
Journal 3
There is a lack of proper analysis of how the DoS and Man in the Middle enter into the
breach elements successfully without getting stopped by the firewall or notified by the
security. This lack of understanding is used by the hackers by utilizing different ways for
breaching.
Journal 4
The various ways that cloud can be breached from outside or manipulated should be analysed
and there should be an understanding into this affair for the best possible security installation
and modification. This could be done properly by finding out ways, through trial and error, to
effect changes in the security systems of the organization. Therefore, it might be necessary to
2017). It is just an awareness journal rather than a problem-solving one. It has also focused
more on the taxonomic divisions of SDN architecture and has not concentrated much on the
effects of cloud computing and provided more open-ended areas in respect to the security of
cloud systems.
Discussing on view on the issue
Journal 1
This journal is a proper description and introduction to the technique and network tools that
are used by the different hackers to make an attempt into the network or system of targeted
individuals. In general, this journal has the good points of making an analysis into the
different ways of the breach to occur along with the different psychological implications
behind any attack that the attacker may implement. However, there is not much diversity in
this article and there are no experiments done in this case.
Journal 2
In this journal, while the real-time detection has been done, there has been many assumptions
that have been used in this case. Also, the report has only used the study for the breaching
system into vehicular networks under controlled environments, and the same could not be
used for the different other networks in companies. This journal also has not provided much
evidence on the basis of experiments but have only used certain elements out of their study in
the processes used which are limiting. No penetration testing has been done to engage into a
comparative analysis.
Journal 3
There is a lack of proper analysis of how the DoS and Man in the Middle enter into the
breach elements successfully without getting stopped by the firewall or notified by the
security. This lack of understanding is used by the hackers by utilizing different ways for
breaching.
Journal 4
The various ways that cloud can be breached from outside or manipulated should be analysed
and there should be an understanding into this affair for the best possible security installation
and modification. This could be done properly by finding out ways, through trial and error, to
effect changes in the security systems of the organization. Therefore, it might be necessary to
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

conduct an experiment with assumptions and then eliminating assumptions and that could
help in identifying a specified rule to understand and make changes in this effect.
Journal 5
There are several open issues but for the identification of them, there should be a proper
interrogation into how they affect the internet and cloud system through their entry points.
The journal also seems to focus more on the identification and the taxonomical division of
the SDN architecture and in the process of identifying the protective measures that the SDN
architecture could adopt that would help in the protection of the same, the journal seems to
skim over cloud protection which is an area most affect by DoS and DDoS attacks.
Future Directions
The future research direction should be made more towards an analytical and interrogative
manner rather than categorial and descriptive which it currently is. There is a need to make
sure that the programmers and network analysts try to understand how hackers and third-
party breaches enter and take control of the network in different ways and for that reason,
there is a need to bring about certain predictive algorithms that shall help in predicting and
preventing such breaching in the network. The security features could be strengthened is a
proper identification and predictive algorithm could stop the breach before it takes place. In
order to attain a certain form of stability in the security features of the organization, there will
be a need to conduct different measurement and calculation based on different kinds of
assumptions and then, through trial and error, each assumption should be eliminated and the
conditions should be tweaked to create a good predictive analysis that will detect any kind of
attack before it can affect a network. The measurements should also consider the
psychological effect that the hackers have, referred as hacktivism, which makes them target
certain network units to arrange a planned attack. Future researches should try to find out in
what way and how such changes could be brought in and what impact they might have on the
SDN and on the networking universe as a whole. There is a necessity for different kind of
real-time experiments to be taken on natural systems with different assumptions to check the
progress through which a DoS attack occurs. The assumptions should be lowered during the
progress to triangulate on how DoS attack occurs and progresses and therefore, in the natural
area of occurrence, this kind of problem should be examined and studied properly. While one
of the journals have created a taxonomic division of SDN systems, there is a need for
incorporating certain changes in the infrastructural base of the organization in a manner that it
will be made more secure and more capable of tackling different forms of attacks.
help in identifying a specified rule to understand and make changes in this effect.
Journal 5
There are several open issues but for the identification of them, there should be a proper
interrogation into how they affect the internet and cloud system through their entry points.
The journal also seems to focus more on the identification and the taxonomical division of
the SDN architecture and in the process of identifying the protective measures that the SDN
architecture could adopt that would help in the protection of the same, the journal seems to
skim over cloud protection which is an area most affect by DoS and DDoS attacks.
Future Directions
The future research direction should be made more towards an analytical and interrogative
manner rather than categorial and descriptive which it currently is. There is a need to make
sure that the programmers and network analysts try to understand how hackers and third-
party breaches enter and take control of the network in different ways and for that reason,
there is a need to bring about certain predictive algorithms that shall help in predicting and
preventing such breaching in the network. The security features could be strengthened is a
proper identification and predictive algorithm could stop the breach before it takes place. In
order to attain a certain form of stability in the security features of the organization, there will
be a need to conduct different measurement and calculation based on different kinds of
assumptions and then, through trial and error, each assumption should be eliminated and the
conditions should be tweaked to create a good predictive analysis that will detect any kind of
attack before it can affect a network. The measurements should also consider the
psychological effect that the hackers have, referred as hacktivism, which makes them target
certain network units to arrange a planned attack. Future researches should try to find out in
what way and how such changes could be brought in and what impact they might have on the
SDN and on the networking universe as a whole. There is a necessity for different kind of
real-time experiments to be taken on natural systems with different assumptions to check the
progress through which a DoS attack occurs. The assumptions should be lowered during the
progress to triangulate on how DoS attack occurs and progresses and therefore, in the natural
area of occurrence, this kind of problem should be examined and studied properly. While one
of the journals have created a taxonomic division of SDN systems, there is a need for
incorporating certain changes in the infrastructural base of the organization in a manner that it
will be made more secure and more capable of tackling different forms of attacks.

References
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident
handling in the cloud. Computers & Security, 49, 45-69.
Akhunzada, A., Ahmed, E., Gani, A., Khan, M. K., Imran, M., &Guizani, S. (2015). Securing
software defined networks: taxonomy, requirements, and open issues. IEEE
Communications Magazine, 53(4), 36-44.
Bello Garba, A., Armarego, J., & Murray, D. (2015). Bring your own device organizational
information security and privacy. ARPN Journal of Engineering and Applied
Sciences, 10(3), 1279-1287.
Conklin, W. A., White, G., Cothren, C., Davis, R., & Williams, D. (2015). Principles of
computer security. McGraw-Hill Education Group.
Fraunholz, D., Lipps, C., Zimmermann, M., Antón, S. D., Mueller, J. K. M., & Schotten, H.
D. (2017, October). Deception in Information Security: Legal Considerations in the
Context of German and European Law. In International Symposium on Foundations
and Practice of Security (pp. 259-274). Springer, Cham.
Garba, A. B., Armarego, J., Murray, D., & Kenworthy, W. (2015). Review of the information
security and privacy challenges in Bring Your Own Device (BYOD)
environments. Journal of Information privacy and security, 11(1), 38-54.
Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Zhou, L. (2015). Externalities and the
magnitude of cyber security underinvestment by private sector firms: a modification
of the Gordon-Loeb model. Journal of Information Security, 6(1), 24.
Ivanov, M. A., Roslyj, E. B., Starikovskiy, A. V., Krasnikova, S. A., Shevchenko, N. A., &
Shustova, L. I. (2018). Non-Binary Pseudorandom Number Generators For
Information Security Purposes. Procedia Computer Science, 123, 203-211.
Laybats, C., & Tredinnick, L. (2016). Information security.
Layton, T. P. (2016). Information Security: Design, implementation, measurement, and
compliance. CRC Press.
Lee, J., Yoo, B., Lee, H., Cha, G. D., Lee, H. S., Cho, Y., ... & Kang, M. (2017). Ultra ‐
wideband multi‐Dye‐sensitized upconverting nanoparticles for information security
application. Advanced Materials, 29(1).
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident
handling in the cloud. Computers & Security, 49, 45-69.
Akhunzada, A., Ahmed, E., Gani, A., Khan, M. K., Imran, M., &Guizani, S. (2015). Securing
software defined networks: taxonomy, requirements, and open issues. IEEE
Communications Magazine, 53(4), 36-44.
Bello Garba, A., Armarego, J., & Murray, D. (2015). Bring your own device organizational
information security and privacy. ARPN Journal of Engineering and Applied
Sciences, 10(3), 1279-1287.
Conklin, W. A., White, G., Cothren, C., Davis, R., & Williams, D. (2015). Principles of
computer security. McGraw-Hill Education Group.
Fraunholz, D., Lipps, C., Zimmermann, M., Antón, S. D., Mueller, J. K. M., & Schotten, H.
D. (2017, October). Deception in Information Security: Legal Considerations in the
Context of German and European Law. In International Symposium on Foundations
and Practice of Security (pp. 259-274). Springer, Cham.
Garba, A. B., Armarego, J., Murray, D., & Kenworthy, W. (2015). Review of the information
security and privacy challenges in Bring Your Own Device (BYOD)
environments. Journal of Information privacy and security, 11(1), 38-54.
Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Zhou, L. (2015). Externalities and the
magnitude of cyber security underinvestment by private sector firms: a modification
of the Gordon-Loeb model. Journal of Information Security, 6(1), 24.
Ivanov, M. A., Roslyj, E. B., Starikovskiy, A. V., Krasnikova, S. A., Shevchenko, N. A., &
Shustova, L. I. (2018). Non-Binary Pseudorandom Number Generators For
Information Security Purposes. Procedia Computer Science, 123, 203-211.
Laybats, C., & Tredinnick, L. (2016). Information security.
Layton, T. P. (2016). Information Security: Design, implementation, measurement, and
compliance. CRC Press.
Lee, J., Yoo, B., Lee, H., Cha, G. D., Lee, H. S., Cho, Y., ... & Kang, M. (2017). Ultra ‐
wideband multi‐Dye‐sensitized upconverting nanoparticles for information security
application. Advanced Materials, 29(1).

Lowry, P. B., Posey, C., Bennett, R. B. J., & Roberts, T. L. (2015). Leveraging fairness and
reactance theories to deter reactive computer abuse following enhanced organisational
information security policies: An empirical study of the influence of counterfactual
reasoning and organisational trust. Information Systems Journal, 25(3), 193-273.
Lyamin, N., Vinel, A., Jonsson, M., & Loo, J. (2014). Real-time detection of denial-of-
service attacks in IEEE 802.11 p vehicular networks. IEEE Communications
letters, 18(1), 110-113.
Mayadunne, S., & Park, S. (2016). An economic model to evaluate information security
investment of risk-taking small and medium enterprises. International Journal of
Production Economics, 182, 519-530.
Oriyano, S. P. (2016). Denial of Service. CEH™ v9: Certified Ethical Hacker Version 9
Study Guide, 305-329.
Parsons, K. M., Young, E., Butavicius, M. A., McCormac, A., Pattinson, M. R., & Jerram, C.
(2015). The influence of organizational information security culture on information
security decision making. Journal of Cognitive Engineering and Decision
Making, 9(2), 117-129.
Safa, N. S., & Von Solms, R. (2016). An information security knowledge sharing model in
organizations. Computers in Human Behavior, 57, 442-451.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance
model in organizations. Computers & Security, 56, 70-82.
Scott-Hayward, S., Natarajan, S., &Sezer, S. (2016). A survey of security in software defined
networks. IEEE Communications Surveys & Tutorials, 18(1), 623-654.
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information
security policies: An exploratory field study. Information & management, 51(2), 217-
224.
Sommestad, T., Hallberg, J., Lundholm, K., & Bengtsson, J. (2014). Variables influencing
information security policy compliance: a systematic review of quantitative
studies. Information Management & Computer Security, 22(1), 42-75.
reactance theories to deter reactive computer abuse following enhanced organisational
information security policies: An empirical study of the influence of counterfactual
reasoning and organisational trust. Information Systems Journal, 25(3), 193-273.
Lyamin, N., Vinel, A., Jonsson, M., & Loo, J. (2014). Real-time detection of denial-of-
service attacks in IEEE 802.11 p vehicular networks. IEEE Communications
letters, 18(1), 110-113.
Mayadunne, S., & Park, S. (2016). An economic model to evaluate information security
investment of risk-taking small and medium enterprises. International Journal of
Production Economics, 182, 519-530.
Oriyano, S. P. (2016). Denial of Service. CEH™ v9: Certified Ethical Hacker Version 9
Study Guide, 305-329.
Parsons, K. M., Young, E., Butavicius, M. A., McCormac, A., Pattinson, M. R., & Jerram, C.
(2015). The influence of organizational information security culture on information
security decision making. Journal of Cognitive Engineering and Decision
Making, 9(2), 117-129.
Safa, N. S., & Von Solms, R. (2016). An information security knowledge sharing model in
organizations. Computers in Human Behavior, 57, 442-451.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance
model in organizations. Computers & Security, 56, 70-82.
Scott-Hayward, S., Natarajan, S., &Sezer, S. (2016). A survey of security in software defined
networks. IEEE Communications Surveys & Tutorials, 18(1), 623-654.
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information
security policies: An exploratory field study. Information & management, 51(2), 217-
224.
Sommestad, T., Hallberg, J., Lundholm, K., & Bengtsson, J. (2014). Variables influencing
information security policy compliance: a systematic review of quantitative
studies. Information Management & Computer Security, 22(1), 42-75.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Sommestad, T., Karlzén, H., & Hallberg, J. (2015). A meta-analysis of studies on protection
motivation theory and information security behaviour. International Journal of
Information Security and Privacy (IJISP), 9(1), 26-46.
Teh, P. L., Ahmed, P. K., & D'Arcy, J. (2015). What Drives Information Security Policy
Violations among Banking Employees?: Insights from Neutralization and Social
Exchange Theory. Journal of Global Information Management (JGIM), 23(1), 44-64.
Vithanwattana, N., Mapp, G., & George, C. (2017). Developing a comprehensive information
security framework for mHealth: a detailed analysis. Journal of Reliable Intelligent
Environments, 3(1), 21-39.
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data:
privacy and data mining. IEEE Access, 2, 1149-1176.
Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined
networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
motivation theory and information security behaviour. International Journal of
Information Security and Privacy (IJISP), 9(1), 26-46.
Teh, P. L., Ahmed, P. K., & D'Arcy, J. (2015). What Drives Information Security Policy
Violations among Banking Employees?: Insights from Neutralization and Social
Exchange Theory. Journal of Global Information Management (JGIM), 23(1), 44-64.
Vithanwattana, N., Mapp, G., & George, C. (2017). Developing a comprehensive information
security framework for mHealth: a detailed analysis. Journal of Reliable Intelligent
Environments, 3(1), 21-39.
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data:
privacy and data mining. IEEE Access, 2, 1149-1176.
Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined
networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.