WebApp Sec mailing list archives

Security and Communication Networks - Special Issue on Software Defined Networking Security


From: Gregory Blanc <gregory.blanc () gmail com>
Date: Fri, 31 Oct 2014 11:58:27 +0100

[Apologies if you receive multiple copies of this message]
* Wiley's Security and Communication Networks (SCN) *
** Special Issue on Software Defined Networking Security **

Recent years have witnessed the rapid development of software-defined networking
(SDN), which transfers essential networking functionalities from the hardware
infrastructure to the software plane by decoupling the control plane
and the data plane.
As such, the complexity of network administration and management can
be significantly
simplified, further enhancing flexibility and scalability of the
diverse networking
applications running upon SDN controllers. In particular, as one of
the major benefits,
the traditional security mechanisms such as firewalls and IDSs could
be more easily
implemented than those of legacy networks, primarily thanks to the centralized
monitoring, detection, and reaction. However, as a new technology, SDN
is potentially
subject to novel threats and attacks. For instance, decoupling the
data plane and the
control plane essentially opens a door to attackers for exploiting the
vulnerabilities of SDN applications, their APIs, controllers and
protocols, and further break their trust relations. An SDN oriented
in-depth defense line thus remains unclear.
This special issue is therefore dedicated to collect the latest
practices, experiences, and lessons learned on SDN-centric trust,
security and privacy research, from both industry and academia, with
the objective to promote the relevant research activities in the
communities of both SDN and security.
This special issue will embrace two tracks of SDN related security
research, including,
but not limited to, the following topics:
- SDN-enabling security management
-- SDN-oriented security policy enforcement
-- SDN-enabling security architecture
-- SDN-based security mechanism deployment (firewalls, IDSs, DDoS
mitigation, etc.)
-- SDN-based filtering/routing/proxying (reflector networks,
quarantine systems, tarpits, etc.)
-- SDN-based mitigation for L2 attacks
-- SDN-based mitigation for L3/L4 attacks (spoofing, network DoS, etc.)
-- SDN-based automated network security
-- SDN-based honeynets
-- SDN-based VLANs
-- SDN-based cloud protection
- SDN-related security risks, threats and attacks
-- SDN as Single point of failure
-- Proofs of security in SDN-based networks
-- Logic flaws in SDN implementations
-- SDN controller subversion
-- Authentication/confidentiality in SDN-based networks
-- Attacks/defense to SDN controllers, protocols, and APIs
-- Trust management of SDN applications and controllers

*** Important Dates (tentative) ***
Submission deadline: November 31, 2014
Author notifications: February 15, 2015
Final manuscripts: March 31, 2015
Publication date: TBD

*** Guest Editors ***
- Dr. Gregory Blanc, Institut Mines-Télécom/Télécom SudParis, France
[gregory.blanc () telecom-sudparis eu]
- Dr. Seungwon Shin, KAIST, Korea [claude () kaist ac kr]
- Dr. Xiaodong Lin, University of Ontario Institute of Technology, Canada
[Xiaodong.Lin () uoit ca]
- Dr. Zonghua Zhang, Institut Mines-Télécom/Télécom Lille, France
[zonghua.zhang () telecom-lille fr]
- Dr. Sriram Natarajan, Deutsche Telekom Labs, USA
[sriram.natarajan () telekom com]

*** Submission Guidelines ***
Submitted papers should not be under consideration elsewhere for
publication and the
authors must follow the guidelines for preparation of the manuscripts. For any
previously published papers in conferences, the journal version of
these papers MUST
have at least 70% additional contributions. This will be checked closely.
The language of the journal is English. 12-point type in one of the
standard fonts,
Times, Helvetica, or Courier is preferred. The paper length should not
exceed 20 pages
in total including all figures and illustrations. It is not necessary
for authors to double-line space their manuscript. Figures and tables
must be on separate pages after the reference list, and not be
incorporated into the main text. Figures should be uploaded as
separate figure files. For manuscript submission, authors should
follow the guidelines described in Section "For Authors" at:
http://www.interscience.wiley.com/security

Prospective authors should submit their paper online at:
http://mc.manuscriptcentral.com/scn

When submitting the papers, the authors should make sure to choose the
Manuscript type as "Special Issue", enter the "Running Head" and the
"Special Issue title" as "TBD" and "Special Issue on Software Defined
Networking Security", respectively.



This list is sponsored by Cenzic
--------------------------------------
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenzic Website HealthCheck. FREE.
Request Yours Now!
http://www.cenzic.com/2009HClaunch_Securityfocus
--------------------------------------


Current thread: