FS-OpenSecurity: A taxonomic modeling of security threats in SDN for future sustainable computing

Yunsick Sung, Pradip Kumar Sharma, Erik Miranda Lopez, Jong Hyuk Park*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

30 Citations (Scopus)
1 Downloads (Pure)


Software Defined Networking (SDN) has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT) infrastructure. For Future Sustainability Computing (FSC), SDN needs to deliver on many information technology commitments-more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO) and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

Original languageEnglish
Article number919
Number of pages26
JournalSustainability (Switzerland)
Issue number9
Publication statusPublished - 9 Sep 2016


  • FS-OpenSecurity
  • SDN architecture
  • Security model


Dive into the research topics of 'FS-OpenSecurity: A taxonomic modeling of security threats in SDN for future sustainable computing'. Together they form a unique fingerprint.

Cite this