A Modular Secure Framework Based on SDMN for Mobile Core Cloud

  • Karim ZkikEmail author
  • Tarik Tachihante
  • Ghizlane Orhanou
  • Said El Hajji
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10026)


During these last few years, mobile data traffic has been strongly growing while the voice traffic decreases (fixed and mobile), This new reality pushes operators to invest in a new next generation of mobile network (Mobile Cloud Computing, 5G) to enhance their competitivity and provide more innovative marketing products and services to the end user. But they were facing a major obstacle: the computer networks management is too complex and difficult. The research community proposes Software Defined Mobile Networks (SDMNs) as a solution to provide more flexibility and to ease the management of the next-generation mobile networks especially Mobile Cloud Computing (MCC). This new solution offers a huge advantage to the mobile operators and enables innovation through network programmability. SDMN provides several benefits including, network and service customized, improved operations and better performance, but there are some security issues that need to be taken care of. This paper describes the emergence of SDMN as an important new networking technology, discusses the different problems related to security issue. We propose a framework to secure the different levels in SDMN architecture with an implementation of our framework. A simulation has been done of some main threats such as DDoS attack and malware infection.


Virtual Machine Mobile Network Intrusion Detection Control Plan Data Plan 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Ericsson Mobility Report (2015)Google Scholar
  2. 2.
    Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 20152020 (2016)Google Scholar
  3. 3.
    Kreutz, D., Ramos, F.M.V., Verissimo, P., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2015)CrossRefGoogle Scholar
  4. 4.
    Masoudi, R., Ghaffari, A.: Software defined networks: a survey. J. Netw. Comput. Appl. 67, 1–25 (2016)CrossRefGoogle Scholar
  5. 5.
    Ryan, M.D.: Cloud computing security: the scientific challenge, and a survey of solutions. J. Syst. Soft. 86, 2263–2268 (2013)CrossRefGoogle Scholar
  6. 6.
    Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Fut. Gener. Comput. Syst. 29, 84106 (2013)Google Scholar
  7. 7.
    Bellavistaa, P., Callegatia, F., Cerronia, W., Contolic, C., Corradia, A., Foschinia, L., Pernafinia, A., Santandrea, G.: Virtual network function embedding in real cloud environments. Comput. Netw. 93, 506517 (2015). Part 3CrossRefGoogle Scholar
  8. 8.
    Naboulsi, D., Fiore, M., Ribot, S., Stanica, R.: Large-scale mobile traffic analysis: a survey. IEEE Commun. Surv. Tutorials 18(1), 124–161 (2015). IEEE Communications Society, Institute of Electrical and Electronics EngineersCrossRefGoogle Scholar
  9. 9.
    Pentikousis, K., Wang, Y., Weihua, H.: Huawei Technologies, MobileFlow, Toward SoftwareDefined Mobile Networks (2012)Google Scholar
  10. 10.
    Yao, G., Bi, J., Guo, L.: On the cascading failures of multicontrollers in software defined networks. In: 2013 21st IEEE International Conference on Network Protocols (ICNP) (2013)Google Scholar
  11. 11.
    McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 6974 (2008)CrossRefGoogle Scholar
  12. 12.
    Liyanage, M., Ylianttila, M., Gurtov, A.: Securing the control channel of software-defined mobile networks. In: 2014 IEEE 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), p. 16. IEEE (2014)Google Scholar
  13. 13.
    Ahmad, I., Namaly, S., Ylianttilaz, M., Gurtov, A.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutorials 17(4), 2317–2346 (2015)CrossRefGoogle Scholar
  14. 14.
    Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J.L., Kantola, R., Perez, O.L., Itzazelaia, M.U., de Oca, E.M., Valtierra, A. and Jimenez, C: Security for future software defined mobile networks. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies (2015)Google Scholar
  15. 15.
    Fonseca, P., Bennesby, R., Mota, E., Passito, A.: A replication component for resilient openflow-based networking. In: IEEE Network Operations and Management Symposium (NOMS): Mini-Conference (2012)Google Scholar
  16. 16.
    Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: 35th Annual IEEE Conference on Local Computer Networks (2010)Google Scholar
  17. 17.
    Shin, S., Porras, P., Yegneswaran, V., Fong, M., Guofei, G., Tyson, M.: FRESCO: modular composable security services for software-defined networks. In: ISOC Network and Distributed System Security Symposium (2013)Google Scholar
  18. 18.
    Hongxin, H., Han, W., Ahn, G.-J., Zhao, Z.: FLOWGUARD: building robust firewalls for software-defined networks. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN 2014, pp. 97–102 (2014)Google Scholar
  19. 19.
    Luo, S., Hongfang, Y., Li, L.: Practical flow table aggregation in SDN. Comput. Netw. 92, 7288 (2015). Part 1CrossRefGoogle Scholar
  20. 20.
    Jarraya, Y., Madi, T., Debbabi, M.: A survey and a layered taxonomy of software-defined networking. IEEE Commun. Surv. Tutorials 16(4), 1955–1980 (2014)CrossRefGoogle Scholar
  21. 21.
    Benton, K., Camp, L.J., Small, C.: OpenFlow vulnerability assessment. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN 2013, p. 151152. ACM (2013)Google Scholar
  22. 22.
    XenServer 6.x Best Practices. Dell Compellent Storage Center (2013)Google Scholar
  23. 23.
  24. 24.
    Open vSwitch Configuration Guide. Configuration Guide for the OVS PICA8 Switch, 1st edn. (2011)Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Karim Zkik
    • 1
    Email author
  • Tarik Tachihante
    • 1
  • Ghizlane Orhanou
    • 1
  • Said El Hajji
    • 1
  1. 1.Laboratory of Mathematics, Computing and Applications, Faculty of SciencesUniversity of Mohammed V in RabatRabatMorocco

Personalised recommendations