| |||||||||||||||
SCN - Special Issue on SDN Security 2015 : Security and Communication Networks - Special Issue on Software Defined Networking Security | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
* Wiley's Security and Communication Networks (SCN) *
** Special Issue on Software Defined Networking Security ** Recent years have witnessed the rapid development of software-defined networking (SDN), which transfers essential networking functionalities from the hardware infrastructure to the software plane by decoupling the control plane and the data plane. As such, the complexity of network administration and management can be significantly simplified, further enhancing flexibility and scalability of the diverse networking applications running upon SDN controllers. In particular, as one of the major benefits, the traditional security mechanisms such as firewalls and IDSs could be more easily implemented than those of legacy networks, primarily thanks to the centralized monitoring, detection, and reaction. However, as a new technology, SDN is potentially subject to novel threats and attacks. For instance, decoupling the data plane and the control plane essentially opens a door to attackers for exploiting the vulnerabilities of SDN applications, their APIs, controllers and protocols, and further break their trust relations. An SDN oriented in-depth defense line thus remains unclear. This special issue is therefore dedicated to collect the latest practices, experiences, and lessons learned on SDN-centric trust, security and privacy research, from both industry and academia, with the objective to promote the relevant research activities in the communities of both SDN and security. This special issue will embrace two tracks of SDN related security research, including, but not limited to, the following topics: - SDN-enabling security management -- SDN-oriented security policy enforcement -- SDN-enabling security architecture -- SDN-based security mechanism deployment (firewalls, IDSs, DDoS mitigation, etc.) -- SDN-based filtering/routing/proxying (reflector networks, quarantine systems, tarpits, etc.) -- SDN-based mitigation for L2 attacks -- SDN-based mitigation for L3/L4 attacks (spoofing, network DoS, etc.) -- SDN-based automated network security -- SDN-based honeynets -- SDN-based VLANs -- SDN-based cloud protection - SDN-related security risks, threats and attacks -- SDN as Single point of failure -- Proofs of security in SDN-based networks -- Logic flaws in SDN implementations -- SDN controller subversion -- Authentication/confidentiality in SDN-based networks -- Attacks/defense to SDN controllers, protocols, and APIs -- Trust management of SDN applications and controllers *** Important Dates (tentative) *** Submission deadline: November 31, 2014 Author notifications: February 15, 2015 Final manuscripts: March 31, 2015 Publication date: TBD *** Guest Editors *** - Dr. Gregory Blanc, Institut Mines-Télécom/Télécom SudParis, France [gregory.blanc@telecom-sudparis.eu] - Dr. Seungwon Shin, KAIST, Korea [claude@kaist.ac.kr] - Dr. Xiaodong Lin, University of Ontario Institute of Technology, Canada [Xiaodong.Lin@uoit.ca] - Dr. Zonghua Zhang, Institut Mines-Télécom/Télécom Lille, France [zonghua.zhang@telecom-lille.fr] - Dr. Sriram Natarajan, Deutsche Telekom Labs, USA [sriram.natarajan@telekom.com] *** Submission Guidelines *** Submitted papers should not be under consideration elsewhere for publication and the authors must follow the guidelines for preparation of the manuscripts. For any previously published papers in conferences, the journal version of these papers MUST have at least 70% additional contributions. This will be checked closely. The language of the journal is English. 12-point type in one of the standard fonts, Times, Helvetica, or Courier is preferred. The paper length should not exceed 20 pages in total including all figures and illustrations. It is not necessary for authors to double-line space their manuscript. Figures and tables must be on separate pages after the reference list, and not be incorporated into the main text. Figures should be uploaded as separate figure files. For manuscript submission, authors should follow the guidelines described in Section "For Authors" at: http://www.interscience.wiley.com/security Prospective authors should submit their paper online at: http://mc.manuscriptcentral.com/scn When submitting the papers, the authors should make sure to choose the Manuscript type as "Special Issue", enter the "Running Head" and the "Special Issue title" as "TBD" and "Special Issue on Software Defined Networking Security", respectively. |
|