E-Government Cybersecurity Modeling in the Context of Software-Defined Networks

E-Government Cybersecurity Modeling in the Context of Software-Defined Networks

Raja Majid Ali Ujjan, Imran Taj, Sarfraz Nawaz Brohi
Copyright: © 2022 |Pages: 21
DOI: 10.4018/978-1-7998-9624-1.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Currently, information and communication technologies are going in advance, allowing more information to be distributed globally via the internet superhighway. While being interconnected to the virtual world, people are becoming increasingly focused, large, and smart, needing the development of new solutions that will be implemented and robust network security systems. When the information is being handled in the applications, it is vulnerable to attack at every stage, and it is impossible to handle it in a separate manner, as traditional security systems have done. The introduction of software-defined networks (SDN) has provided a novel perspective on data security, since the network may assist in the construction of stable and safe continuity in the context of risks posed by the internet. The structure of SDN, particularly its gradual construction and centralization of network data and mechanisms, has pushed us to consider security from a strategy-practiced standpoint. The major goal of this chapter is to give detailed an overview of the current state-of-the-art in the area of SDN security and its significance in the context of e-government applications.
Chapter Preview
Top

1. Introduction

The new generation of healthcare incorporates innovative advancements to incorporate sustainable strategies improve patient care and a higher standard of living. As educing resource consumption and direct or indirect healthcare expenses. These unique clinical environments have a number of advantages, including the capability to support new possibilities, such as medical settings, monitoring vital signs of patients are collected and cognitively analyzed in order to diagnose disorders and ecosystems that aren't invaded anticipating unfavorable outcomes in the early stages, and digital support everywhere. This is made feasible by the combination of activities using actual hardware and virtual information flexible connectivity that fulfil not just the growing demand for speeds ranging and bandwidths (Stankovic, 2016), but also the agility and dynamic essential to control network activities in timely manner. Medical devices in medical contexts can be openly coordinated, controlled, and connected via ICE-based solutions (Mármol et al., 2016). Despite the advantages of existing solutions, SDN control plane's logical centralized approach and protocols introduce additional vulnerabilities that compromise the diagnostic products, communication network protection, and patient safety (Nespoli et al., 2017). Keeping in mind the prior problems, there are a number of open challenges that require additional attention. We emphasize the importance of designing and configurations that take into account the SDN paradigm's vulnerabilities; the Safety methods are being implemented in healthcare contexts (Díaz-López et al., 2016). To combat the overwhelming security threats, the fundamental features of a safe mechanism is required that its defenses become more powerful during its whole existence. It is particularly true when a harmful attempt is launched and unexpected information and investment loss, and both from within and external to the connection (Dunhill, 2020). A common network used to operate industrial applications and is accessible over the internet faces significantly. It faces more dangers than just its network counterpart. Traditionally, a hacker attack on the information assets of a company has entailed gaining access to the network through exploitation weaknesses in internet-facing systems. Used this devices of these victims, the stranger will have to put in a lot of effort to get access to the internal network and its various portions, which are all connected via a variety of intermediary boxes. These intermediate boxes could have their own set of vulnerabilities that would take a lot of time, skill, and effort to exploit (Huertas Celdran et al., 2018). Its central control and programmability, in particular, have changed the entire paradigm of enterprise security, eliciting mixed reactions. In one opinion, SDN's nature is considered a design flaw and the biggest threat in the cycle of networking safety precautions, has shifted our perspective on enterprise security in the face of current cyber threats (Fernandez Maimo et al., 2019). A novel definition of cyber antifragility is the ability to respond to a provocation, return to a daily routine with minimal harm, and improve capabilities to thwart future threats of undiscovered or well-known forms. A simple SDN architecture that provides programmability and flexibility (Nguyen et al., 2016). It is necessary to incorporate a functional technique of recognizing issues related to the security of the application, control, and data planes, as well as their associated interfaces, to assure the system's security throughout its lifetime.

Figure 1.

Overview of basic SDN architecture (Cheng et al., 2017)

978-1-7998-9624-1.ch001.f01

The following points will be highlighted in this chapter:

  • 1.

    To provide a wide analysis, Networks that are defined by software (SDN)

  • 2.

    To highlight the applications of e-government in the context of SDN

  • 3.

    To focus on cybersecurity models in the context of SDN

Complete Chapter List

Search this Book:
Reset