Work item:
|
X.sdnsec-1
|
Subject/title:
|
Security services using the software-defined networking
|
Status:
|
[Carried to next study period]
|
Approval process:
|
TAP
|
Type of work item:
|
Recommendation
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
-
|
Liaison:
|
-
|
Supporting members:
|
ETRI, HUAWEI, KISA, Korea (Republic of).
|
Summary:
|
Due to the increase of sophisticated network attacks, the legacy security services become difficult to cope with such network attacks in an autonomous manner. Software-Defined Networking (SDN) has been introduced to make networks more controllable and manageable, and this SDN technology will be promising to autonomously deal with such network attacks in a prompt manner.
Recommendation ITU-T X.sdnsec-1 raises requirements to support the protection of network resources using security services based on SDN. Also, this Recommendation proposes two use cases of the security services, such as centralized firewall system and centralized DDoS-attack mitigation system.
For the centralized firewall system, this Recommendation raises limitations in legacy firewalls in terms of flexibility and administration costs. Since in many cases, access control management for firewall is manually performed, it is difficult to add the access control policy rules corresponding to new network attacks in a prompt and autonomous manner. Thus, this situation requires expensive administration costs. This Recommendation introduces a use case of SDN-based firewall system to overcome these limitations.
For the centralized DDoS-attack mitigation system, this Recommendation raises limitations in legacy DDoS-attack mitigation techniques in terms of flexibility and administration costs. Since in many cases, network configuration for the mitigation is manually performed, it is difficult to dynamically configure network devices to limit and control suspicious network traffic for DDoS attacks. This Recommendation introduces a use case of SDN-based DDoS-attack mitigation system to provide an autonomous and prompt configuration for suspicious network traffic.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2014-10-22 16:07:48
|
Last update:
2016-09-16 14:55:59
|