
With their visualization software, AISEC researchers can monitor every component in software-defined networking (SDN).
Fraunhofer AISEC
Company networks are inflexible – they are made up of many components that require a good deal of effort to be connected together.
That’s why networks of the future will be controlled by a central unit. However, this makes them a target for hackers. At CeBIT, Fraunhofer researchers will demonstrate how to protect these future networks.
oday’s company networks comprise hundreds of devices: routers for directing data packets to the right receiver, firewall components for protecting internal networks from the outside world, and network switches. Such networks are extremely inflexible because every component, every router and every switch can carry out only the task it was manufactured for. If the network has to be expanded, the company has to integrate new routers, firewalls or switches and then program them by hand. That’s why experts worldwide have been working on flexible networks of the future for the last five years or so, developing what is known as software-defined networking (SDN). It presents one disadvantage, however; it is susceptible to hacker attacks.
Researchers from the Fraunhofer Institute for Applied and Integrated Security AISEC in Garching, near Munich, will be showing how to make SDN secure at the CeBIT trade fair in Hannover, March 16-20. A demonstrator at the Fraunhofer exhibition stand (Hall 9, Booth E40) will show how SDN and all related components can be monitored. One of these components is visualization software, which displays the network’s individual components and depicts in real time how the various applications are communicating with the controller. “We can show how software influences the behavior of different components using the controller, or, in the case of an attack, how it disrupts them,” says Christian Banse, a security expert at AISEC.
But how exactly does SDN work, and why is it so vulnerable to attack? “In the future, the plan is for a central control unit to tell the many network components what to do. To put it simply, routers, firewalls and switches lose their individual intelligence – they only follow orders from the controller,” says Banse. This makes a network much more flexible, because the controller can allocate completely new tasks to a router or switch that were not intended when the component was manufactured. Plus, the tedious task of manually configuring components during installation is eliminated because components no longer need to be assigned to a specific place in the network – the controller simply uses them as needed at the moment.
The controller is a popular target for hackers
Manufacturers have begun offering the first routers and switches that are SDN-compatible and have the necessary flexibility. “With all the hype surrounding the new adaptability made possible by a central control unit, SDN security has been neglected,” warns Banse. “That’s why we’re developing solutions to make SDN more secure from the outset, before such systems become firmly established.” In the future, networks will be controlled solely by a central controller – Banse sees this as a problem, because it might provide the perfect loophole for attackers to access the entire network.
Read more: Ensuring security for networks of the future
The Latest on: Network security
[google_news title=”” keyword=”Network security” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
The Latest on: Network security
- Network Security Firewall Market Share 2023 Will Touch New Level in Upcoming Yearon February 4, 2023 at 1:45 am
Network Security Firewall Market Size 2023-2029 | New Report (119 Pages) | In This Reports Network Security Firewall ...
- 3.3 Million Cyber-Attacks Hidden in Encrypted Traffic: Why Encryption for Network Security Is a Doubled-Edged Swordon February 3, 2023 at 10:36 pm
There is a downside to network encryption: it is not simply used as a tool against cybercriminals, but it’s increasingly leveraged by the threat actors themselves ...
- Network Security Appliance Market Size 2023 With Presentation Outlook, Horizontal Viewpoint, Global View Forecast 2028, Report Contains (86) Pageson February 2, 2023 at 9:55 pm
Pages. Due to the COVID-19 pandemic, the global Network Security Appliance market size is estimated to be worth USD million in 2022 and is forecast to ...
- Adva Network Security Layer 2 encryption technology achieves German BSI approvalon February 2, 2023 at 12:33 am
Adva Network Security today announced that its flagship 10Gbit/s edge solution with ConnectGuard ™ Ethernet encryption has been approved for the transmission of classified data by the German Federal ...
- Wi-Fi Security Tips: 10 Ways to Avoid Home Network Hackerson January 27, 2023 at 8:09 am
Your home Wi-Fi network can get hacked. Here's how to stop it from happening. This story is part of Home Tips, CNET's collection of practical advice for getting the most out of your home, inside and ...
- How the 5G core changes the picture of network securityon January 27, 2023 at 7:10 am
While there are numerous security safeguards and specialized functions within the 5G standards, they are not enough to fully protect the network, according to Mike Hawley, Nokia’s head of packet core ...
- Network Security in 2023: Preparing for the Zero Trust Revolutionon January 24, 2023 at 8:46 am
Network security is a set of practices that help organizations protect the confidentiality, integrity, and availability of data transmitted over a network. It involves a range of technologies, ...
- Encryption and Its Impact on Network Security: Transparent vs Forward Proxies and Other Methodologieson January 23, 2023 at 6:33 pm
Visibility into user-based access and user-based access control to various internet sites is a critical aspect of any outbound network security technology. Forward proxy functionality can help achieve ...
- Preventing and Avoiding Network Security Threats and Vulnerabilitieson January 22, 2023 at 4:00 pm
Unified threat management (UTM) gives businesses an all-in-one cybersecurity solution. A UTM can include specialized hardware or software platforms that monitor and block significant network ...
via Bing News