Computação Forense em Redes Definidas por Software (SDN): Uma revisão de literatura

  • Bruno Anselmo Guilhen USP
  • Regina Melo Silveira USP
  • Sergio Takeo Kofuji USP

Abstract


Software Defined Networks (SDN) represent the state of the art in network structures that are being adopted by many companies and service providers. Along with this new challenge of deploying and operating softwarebased networks, there is a need to ensure security in all aspects of the network. In this context, the topic of computer forensics in SDN networks arises, which aims to establish mechanisms to carry out the correct survey and ascertain data on security incidents. Therefore, the article contributes with a literature review by carrying out a survey of the main forensic techniques that have been applied in SDN networks compared to traditional forensic techniques as they relate and complement each other.

References

Abdullaziz, O. I., Wang, L. C., & Chen, Y. J. (2019). "HiAuth: Hidden Authentication for Protecting Software Defined Networks". IEEE Transactions On Network And Service Management. VOL. 16, NO. 2. June 2019.

Achleitner, S., Porta, T. L., Jaeger, T., & McDaniel, P. (2017). "Adversarial Network Forensics in Software Defined Networking". New York: Em Proceedings of the Symposium on SDN Research (SOSR '17). Association for Computing Machinery.

Allouzi, M. A. (2018). "Advanced Authentication Protocol for Software-Defined Networks". World Scientific. International Journal of Semantic Computing. Vol. 12, No. 03, pp. 361-371. 2018.

Aydeger, A., Saputro, N., & Akkaya, K. (2019). "A moving target defense and network forensics framework for ISP networks using SDN and NFV". Future Generation Computer Systems. ELSEVIER. Volume 94. Pages 496-509. May 2019.

Brezinski, D., & Killalea, T. (2002). "Guidelines for evidence collection and archiving". RFC 3227, IETF, 2002.

Brockelsby, W., & Dutta, R. (2019). "A Graded Approach to Network Forensics with Privacy Concerns". IEEE Computing Networking and Communications (ICNC) 2019 International Conference on , pp. 292-297.

Casado, M., McKeown, N., & Shenker, S. (08 de november de 2019). From Ethane to SDN and Beyond. ACM SIGCOMM Computer Communication Review, 92-95. doi:https://doi.org/10.1145/3371934.3371963

Chica, J. C., Imbachi, J. C., & Veja, J. F. (2020). "Security in SDN: A comprehensive survey". Journal of Network and Computer Applications (159). ELSEVIER.

CSA, C. S. (2013). Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing, June 2013.

Duy, T. P., Hoang, H. D., Hien, D. T., Khanh, N. B., Pham, & H., V. (2019). "SDNLog-Foren: Ensuring the Integrity and Tamper Resistance of Log Files for SDN Forensics using Blockchain". 6th NAFOSTED Conference on Information and Computer Science (NICS). 2019.

Farmer, D., & Venema, W. (2016). "Perícia Forense Computacional: Teoria e Prática Aplicada". São Paulo: Pearson.
Published
2021-08-16
GUILHEN, Bruno Anselmo; SILVEIRA, Regina Melo; KOFUJI, Sergio Takeo. Computação Forense em Redes Definidas por Software (SDN): Uma revisão de literatura. In: WORKSHOP ON EXPERIMENTAL RESEARCH OF THE FUTURE INTERNET (WPEIF), 12. , 2021, Uberlândia. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2021 . p. 13-24. ISSN 2595-2692. DOI: https://doi.org/10.5753/wpeif.2021.17195.