Analysis of Network Security Organizatio d811b975
Analysis of Network Security Organizatio d811b975
Analysis of Network Security Organizatio d811b975
UDC 004.056.5
A Software-Defined Network (SDN) on
DOI: 10.15587/1729-4061.2021.242993
a Wide Area Network (WAN) is a computer
network that is controlled and created by
software.
SD-WAN is an emerging research area ANALYSIS OF NETWORK
that has received a lot of attention from
industry and government. This technology
offers tremendous opportunities to support
SECURITY ORGANIZATION
the creation of consolidated data centers
and secure networks. This is an innovation BASED ON SD-WAN
that allows the network to be monitored
and programmed so that it can respond to
network events caused by security breaches.
TECHNOLOGY
This solution provides network security,
offers a single network management Gulzinat Ordabayeva
console, and provides complete control over Corresponding author
the network architecture. Also controls Senior Teacher
security in the cloud software-defined
infrastructure (SDI), such as dynamically
Department of Information Systems
changing the network configuration when Al-Farabi Kazakh National University
forwarding packets, blocking, redirecting, Al-Farabi ave., 71, Almaty, Republic of Kazakhstan, 050040
changing Media Access Control (MAC) or E-mail: gulzi200988@mail.ru
Internet Protocol (IP) addresses, limiting the
packet flow rate etc. Abdizhapar Saparbayev
Using SD-WAN technology, it is possible Doctor of Economic Sciences, Professor, Vice-rector for Science
to reduce the cost of dedicated bandwidth Department of Economics and Business
channels, achieve a high-quality Virtual
Kainar Academy
Private Network (VPN), and the ability to
automatically select a channel for certain Satpayev str., 7A, Almaty, Republic of Kazakhstan, 050013
channels. Bibinur Kirgizbayeva
The main advantages of SD-WAN are PhD, Professor
the management of an unlimited number of
devices from a single center, reducing the
Department of «IT technology and automation»
cost of deploying branch infrastructure. Kazakh National Agrarian Research University
According to the results of the survey, Abai ave., 8, Almaty, Republic of Kazakhstan, 050010
7 % of respondents use SD-WAN for security
solutions, 14 % at the piloting stage.
Gulzat Dzhsupbekova
As a result of the research, it was PhD
revealed that by 2024, to increase the Department of Information Technology
flexibility and support of cloud applications, M. Auezov South Kazakhstan*
more than 60 % of SD-WAN customers will
implement the SASE (Secure Access Service
Nazira Rakhymbek
Edge) architecture, which is 30 % more than Senior Teacher
in 2020 and the main concept – application Department of Information Technology
security and cloud functions M. Auezov South Kazakhstan*
Keywords: OpenFlow, Software defined
*State University
wide area network (SD-WAN), architecture,
DDoS attack, WAN network Tauke khan ave., 5, Shyment, Republic of Kazakhstan, 160012
Received date 23.08.2021 How to Cite: Оrdabayeva, G., Saparbayev, A., Kirgizbayeva, B., Dzhsupbekova, G., Rakhymbek, N. Analysis of network security
Accepted date 17.10.2021 organization based on sd-wan technology. Eastern-European Journal of Enterprise Technologies, 5 (9 (113)), 56-69.
Published date 29.10.2021 doi: https://doi.org/10.15587/1729-4061.2021.242993
56
Copyright © 2021, Authors. This is an open access article under the Creative Commons CC BY license
Information and controlling system
Prevention System, IPS), quality of service (QoS) function, uration Protocol Guard feature (DHCPguard). According
other proxy server that determine the behavior of the net- to a study, DHCPguard increased throughput by up to 94 %
work are implemented; and reduced CPU utilization by up to 92 %.
2) control level – the main element is the SDN controller, SDN provides a flexible way to manage traffic on networks.
which coordinates the network devices located at the infra- The deep Reinforcement Learning (DRL) algorithm was used
structure level; to determine the traffic management method for QoS optimi-
3) infrastructure layer – provides processing and for- zation in hybrid SDN. The simulation results showed that the
warding of packets based on the received instructions from method of this work can lead to a significant improvement in
the control layer; the optimization of the network QoS performance [8].
4) north APIs – allow applications to use network secu- SD-WAN for Internet of Things (IoT) devices provides
rity services, load balancing, traffic management, quality of robust security solutions. IoT and SD-WAN edge devices
service and dynamically configure the network; communicate with a common controller. The cloud controller,
5) southern APIs – provide efficient network management; in turn, informs and allows IoT and SD-WAN edge devices to
6) East/West interfaces – provide communication be- take action to provide protection, especially at the edge of the
tween objects of the control level and exchange of informa- enterprise, where large datasets are aggregated [9].
tion for processing traffic at the level of infrastructures [2]. In [10], the Fake Link Layer Discovery Protocol (LLDP)
An important component of the SD-WAN architecture Injection and LLDP replay methods are considered, which
is a controller that centralizes and monitors the state of the are used to create fake links on the controller. The results re-
network. Main characteristics of the controller: vealed that the Floodlight controller is vulnerable to attacks
– performance – the number of threads processed by the based on the use of LLDP. When receiving invalid routes,
controller per unit of time (threads/s); access to the network is lost and the network performance
– processing time – the amount of time spent by the con- is underestimated.
troller to process the request from the switch (c); In [11], the results of studies of a Distributed Denial of
– reliability – the number of failures at a given load profile; Service (DDoS) attack in SDN, detected using machine
– resource intensity – utilization of the physical server’s learning-based models, are presented. Feature selection
RAM by the controller, and the load on the processor cores; methods are shown to be preferable for simplifying mod-
– scalability – multithreading support by the controller [3]. els and providing shorter training times. Classification
SD-WAN is based on the L2/L3 architecture, in which models were built for Support Vector Machine (SVM),
a centralized controller controls the data transfer of a set of Naive Bayes (NB), Artificial neural network (ANN), and
distributed switches using a control protocol, for example, K-Nearest Neighbors (KNN). Based on the test results, it
OpenFlow. OpenFlow is an open standard that allows de- was shown that the use of the shell function selection with
velopers to work with experimental protocols on a local area the KNN classifier allowed to achieve the highest level of
network [4–6]. accuracy (98.3 %) in detecting DDoS attacks.
Leading companies are moving to virtualized environ- [12] describes a security architecture for the Internet of
ments, so network architectures are needed that integrate Things (IoT) based on software-defined networks (SDN)
seamlessly with SD-WAN controllers. One of the leading and discusses a new architecture of the IoT system. But
vendors in the implementation of SD-WAN technology is there are still unresolved issues related to the analysis of
Juniper Networks (Sunnyvale, USA), which ensures full the organization of network security based on SD-WAN
compatibility of the network infrastructure with existing technology.
resources. The work [13] considers the preservation of the tradi-
SD-WAN is designed to address constraints such as tional network infrastructure and the gradual upgrade of
high bandwidth costs, the cost of adding new nodes to the this infrastructure to a hybrid SDN (hybrid SDN, hSDN).
network, the cost of changing security policies, and the lack The authors examined hSDN models in the control and data
of network management automation. More than 90 % of planes, considered the optimization of the control plane of
enterprises will be using SD-WAN technology by the end of placement, scalability and security issues, privacy, as well as
2023, according to Gartner’s analysis. existing vulnerabilities and threats. An option to overcome
The developed models of SD-WAN technology indicate the corresponding difficulties may be to update the network
the relevance of research on methods of mathematical anal- in both the outdated and SDN settings. This is the approach
ysis for the classification of processing time of flows and used in [13], however, modeling tools and public test benches
rational planning of the placement of network elements at are a completely undisclosed topic. All this suggests that it
the stage of deployment and scaling. is advisable to conduct a study on the use of hSDN in 5G
mobile networks, cloud and data centers, IoT connectivity,
blockchain, SD-WAN and SD-Branch. In addition, network
2. Literature review and problem statement reliability, resiliency and load balancing are also investigated.
Study [14] discusses SD-WAN Flood Tracer to facilitate
The work [7] analyzed the security of embedded Dy- tracking of DDoS attacks on SD-WAN. Also, to track and
namic Host Configuration Protocol (DHCP) services on prevent other sources of anomalies on legitimate traffic, the
three popular SDN controllers: Python and Apache licensed tracing scheme is divided into two parts. This scheme effec-
(POX), Open Network Operating System (ONOS) and tively monitors internal, external anomalies and prevents
Floodlight (an Apache licensed, Java-based OpenFlow con- damage to communications in the network.
troller). Vulnerabilities have been identified for overloading The growth in the volume of network traffic, the need
controllers when launching denial-of-service attacks. Study- to configure large-scale data transmission networks and the
ing modern methodologies, a DHCP security module on the analysis of the above materials suggest that conducting a
POX controller was developed, the Dynamic Host Config- study on SD-WAN technology is promising.
57
Eastern-European Journal of Enterprise Technologies ISSN 1729-3774 5/9 ( 113 ) 2021
Fig. 2. Proposed DDoS detection and protection model for SDN [17]
58
Information and controlling system
80 80
a
80
60 60
40 40
60
PNAD PNAD PNAD
FENAD 20 FENAD 20 FENA
LNAD LNAD LNAD
0 0
0 10 20 30 40 0 10 20 30 40 0 10 20 30 40
False positive False positive False positive
a
100 100
80 80
True positive rate/ %
True positive rate/ %
60 60
40 40
PNAD PNAD PNAD
FENAD 20 FENAD 20 FENAD
LNAD LNAD bLNAD
0 0
0 40 0 10 20 30 40 0 10 20 30 40
itive False positive Fig. 4. The results of False
the delay: a
positive – an increase in the number of devices;
b – an increase in the number of requests [19]
b
100
5. Results of the study of the SD-WAN technology
80 testing algorithm
True positive rate/ %
59
Eastern-European Journal of Enterprise Technologies ISSN 1729-3774 5/9 ( 113 ) 2021
60
Information and controlling system
(7)
σ 3в
s
– the number of bytes transmitted through the port;
– average speed in packets/s;
3
– average speed in bytes/s; where t – the third initial moment
– load of the processor and memory of the switch;
N
– port queue lengths [26]. 1
∑ (t − tk ) .
3
t3 = k +1 (8)
Calculating the average time between packets is needed N k =0
for routing and network management:
Using the above formulas, certain data showed the dif-
t ference between the analyzed traffic and the Poisson one,
τ= , (1)
N since the coefficient of variation c>1, and the asymmetry
value As>2. Taking into account the ratio of the lengths
where t – observation time; N – average number of pack- of the packets of reverse requests (64 bytes) and the main
ages. packets (1500 bytes), reverse requests increase the load on
Calculating variance for the distribution of time between the channels by about 4 %.
packets:
5. 3. Development of a testing algorithm to optimize
τ3 the network security system based on SD-WAN tech-
Dτ = DN ⋅ . (2)
t nology
In the study [16], applying the Poisson distribution
Using the above formulas, the number of packets per formula over the time interval [T0, Tf]=mTi to estimate the
stream is calculated accurately, but according to manufac- probability of k-requests from the switch to the controller,
turers, it can differ from reality by up to 20 %. we obtained:
Research data on SD-WAN technology methods and
algorithms improves performance that accelerates security
Pd τ NF =
( λmTi ) e − λmT i
. (9)
and network connectivity tasks. The cost-effectiveness of k!
SD-WAN technologies is a key driver for the development
of the network structure and provides a quick return on The probability of n events on the switch is determined
investment. by the formula:
61
Eastern-European Journal of Enterprise Technologies ISSN 1729-3774 5/9 ( 113 ) 2021
D = l ⋅ d τ NF + n ⋅ d τ, (11)
62
Information and controlling system
63
Eastern-European Journal of Enterprise Technologies ISSN 1729-3774 5/9 ( 113 ) 2021
5. 4. Analysis of the implementation of SD-WAN shown that the approach successfully demonstrates robust-
technology ness and efficiency through the use of SDN programmability
SD-WAN is a new paradigm in network design and for the global network [30, 31].
management that enables network programmability and Using the Hurst coefficient, the regularities of the length
separation of control planes. of transmitted packets in our network are determined.
The research paper [28] deals with the Controller Place- First, the average mathematical expectation of the pack-
ment Problem (CPP) and defines the Quality of Service et length is calculated:
(QoS) requirements. The proposed algorithms use graph the-
N
ory to heuristically search for high-quality solutions. The SD- 1
WAN topology is represented by a connected graph G(V,E),
M=
N
∑X .
i =1
i (19)
V=S∪C, where S is a set of switches with OpenFlow support,
and C is controller locations, E is a set of weighted links. Calculation of the average standard deviation of the size
Weighted links are propagation delays between nodes of the packet length:
depending on their geographic location. Assuming the con- N
1
∑(X − M) .
2
trollers can be in the same location as the switches, the po- S= i (20)
tential controller locations are equal to the switch set (C=S). N i =1
∑y
j ÎC
i . (12)
i
Di = ∑X i − M . (21)
j =1
yi≥x ij,∀iÎS, jÎC. (13) Calculation of the range (amplitude) of the change in D
values:
∑x = r , ∀i Î S . (14)
R = max {D} − min {D} .
ij
j ÎC (22)
∑l ⋅ x
iÎS
i ij ≤ uc , ∀j ÎC . (15) Calculation of the Hurst coefficient:
R
ln
The specified limit (15) prevents the total load put on by S
H= . (23)
the switches on the controller from exceeding its uc band- ln ( N )
width.
The result of the calculation in PHP (Fig. 12)
d ij ⋅ x ij ≤ scmax , ∀i ÎS , ∀j ÎC . (16)
d j ′j ′′ y j ′ y j ′′ ≤ ccmax , ∀j ′, j ′′ ÎC . (17)
x ij , y j Î{0,1} , ∀i ÎS , ∀j ÎC . (18)
64
Information and controlling system
Table 2
Comparison of SD-WAN solutions
The main characteristics
Manufac- Own hard- High-quality High qual- Subscription Flexible building of
turers Hypervisor Cloud Lack of
ware and documentation and ity service and perpetual configurations based
support support risks
virtual training system support licensing on templates
VMware √ √ √ √ √ √ √ √
Cisco √ √ √ √ √ √ √ √
Fortinet √ √ √ √ √ √ √ –
Palo Alto
√ √ √ √ √ √ √ –
Networks
Silver Peak – – √ – √ – – –
Aryaka √ √ √ √ – – – –
Nokia √ √ √ – √ √ – –
Versa Net-
√ – √ √ √ – √ √
works
Citrix √ √ √ √ √ √ √ –
Huawei √ √ √ √ √ √ √ √
Juniper √ √ √ √ √ √ √ –
Oracle √ √ √ √ √ √ √ √
Riverbed √ √ √ – √ – – –
Zyxel √ √ √ √ – – – –
65
Eastern-European Journal of Enterprise Technologies ISSN 1729-3774 5/9 ( 113 ) 2021
ORACLE
PALO ALTO…
CITRIX
HUAWEI
JUNIPER
RIVERBED
VERSA NETWORKS
VMWARE
FORTINET
CISCO
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
The SD-WAN concept is a technology for distributing In the discussion, experts noted three SD-WAN security
network traffic over data network channels to automatical- models, such as SD-WAN with built-in security, SD-WAN
ly determine the most efficient route for traffic between an using a chain of services and cloud security, SD-WAN with
office and a data processing center (DPC). In the process, a corporate firewall [36].
the network administrator determines the appropriate se- The head of the BI Group holding reports that, since
curity policies. SD-WAN components are: the introduction of SD-WAN, the load on the information
– terminal devices that replace WAN routers; security department has dropped sharply, and this despite
– orchestrator – configuring traffic routing policy and the fact that there are more objects, also, the quality of the
security functionality; network has dramatically improved [34].
– Analytics tools are reports based on data collected One of the leading SD-WAN solution providers is For-
from endpoints, such as channel history, network application tinet, which has received Recommended status from NSS
history, and node availability. Labs for the implementation of the next generation firewall
The SD-WAN security solution for on-premises and (NGFW). NGFW provides ISO Level 3 through 7 security
cloud-based security includes the following categories: net- using its own security processor. The SD-WAN solution
work segmentation, corporate firewall, secure web gateway, also monitors firewall rules and policies and offers recom-
and DNS-compromised security [35]. mendations for optimizing the entire security system [36].
66
Information and controlling system
References
1. Laponina, O. R., Sizov, M. R. (2017). Laboratory bench for testing the integration capabilities of SDN networks and traditional
networks. International Journal of Open Information Technologies, 5 (9).
2. Mukhizi, S., Mutkhanna, A. S., Kirichek, R. V, Kucheriavii, A. E. (2019). Issledovanie modelei balansirovki nagruzki v programmno-
konfiguriruemykh setiakh. Elektrosviaz, 1, 23–29
3. Sallent, O., Perez-Romero, J., Ferrus, R., Agusti, R. (2017). On Radio Access Network Slicing from a Radio Resource Management
Perspective. IEEE Wireless Communications, 24 (5), 166–174. doi: http://doi.org/10.1109/mwc.2017.1600220wc
67
Eastern-European Journal of Enterprise Technologies ISSN 1729-3774 5/9 ( 113 ) 2021
4. OpenFlow Management and Configuration Protocol (OF-CONFIG 1.2). ONF TS-016. Available at: https://www.opennetworking.
org/wp-content/uploads/2013/02/of-config-1.2.pdf Last accessed: 15.08.2021
5. Google’s Inter-Datacenter WAN Using SDN and OpenFlow. Available at: https://opennetworking.org/sdn-resources/customer-
case-studies/google/
6. OpenFlow. Available at: https://lvk.cs.msu.su/~sveta/SDN_OpenFlow_basics_lecture1_v2.pdf Last accessed: 15.08.2021
7. Tok, M. S., Demirci, M. (2021). Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard.
Computers & Security, 109, 102394. doi: http://doi.org/10.1016/j.cose.2021.102394
8. Huang, X., Zeng, M., Xie, K. (2021). Intelligent traffic control for QoS optimization in hybrid SDNs. Computer Networks,
189, 107877. doi: http://doi.org/10.1016/j.comnet.2021.107877
9. Pamplin, S. (2021). SD-WAN revolutionises IoT and edge security. Network Security, 2021 (8), 14–15. doi: http://doi.org/10.1016/
s1353-4858(21)00090-8
10. Tok, S., Demirci, M. (2021). An Investigation of Topology Poisoning Attacks in Software Defined Networks Through Exploiting
Link Layer Discovery Protocol, 589–608. Uludağ University Journal of The Faculty of Engineering, . doi: http://doi.org/10.17482/
uumfd.769939
11. Polat, H., Polat, O., Cetin, A. (2020). Detecting DDoS Attacks in Software-Defined Networks Through Feature Selection Methods
and Machine Learning Models. Sustainability, 12 (3), 1035. doi: http://doi.org/10.3390/su12031035
12. Olivier, F., Carlos, G., Florent, N. (2015). New Security Architecture for IoT Network. Procedia Computer Science, 52, 1028–1033.
doi: http://doi.org/10.1016/j.procs.2015.05.099
13. Khorsandroo, S., Sánchez, A. G., Tosun, A. S., Arco, J., Doriguzzi-Corin, R. (2021). Hybrid SDN evolution: A comprehensive survey
of the state-of-the-art. Computer Networks, 192, 107981. doi: http://doi.org/10.1016/j.comnet.2021.107981
14. Dayal, N., Srivastava, S. (2021). SD-WAN Flood Tracer: Tracking the entry points of DDoS attack flows in WAN. Computer
Networks, 186, 107813. doi: http://doi.org/10.1016/j.comnet.2021.107813
15. Smelianskii, R. L. (2014). Tekhnologii SDN i NFV: novye vozmozhnosti dlia telekommunikatsii. Vestnik Sviazi, 1, 43–47. Available
at: https://www.arccn.ru/media/1132/ Last accessed: 29.08.2021
16. Galich, S. V., Deogenov, M. S., Kartashevskii, V. G., Pasiuk, A. O., Semenov, E. S. (2016). Issledovanie proizvoditelnosti PKS-
kontrollera OpenDaylight na setiakh raznykh masshtabov. Izvestiia IUFU. Tekhnicheskie nauki, 9, 121–133.
17. Fouladi, R. F., Ermiş, O., Anarim, E. (2020). A DDoS attack detection and defense scheme using time-series analysis for SDN.
Journal of Information Security and Applications, 54, 102587. doi: http://doi.org/10.1016/j.jisa.2020.102587
18. Cui, Y., Qian, Q., Xing, H., Li, S. (2020). LNAD: Towards Lightweight Network Anomaly Detection in Software-Defined
Networking. 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th
International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/
DSS), 855–860. doi: http://doi.org/10.1109/hpcc-smartcity-dss50907.2020.00113
19. Pourvahab, M., Ekbatanifard, G. (2019). An Efficient Forensics Architecture in Software-Defined Networking-IoT Using
Blockchain Technology. IEEE Access, 7, 99573–99588. doi: http://doi.org/10.1109/access.2019.2930345
20. ONF TR-502: SDN Architecture (2014). Open Networking Foundation. Available at: https://www.opennetworking.org/images/
stories/downloads/sdn-resources/technical-reports/TR_SDN_ARCH_1.0_06062014.pdf Last accessed: 20.08.2021
21. Queiroz, W., Capretz, M. A. M., Dantas, M. (2019). An approach for SDN traffic monitoring based on big data techniques. Journal
of Network and Computer Applications, 131, 28–39. doi: http://doi.org/10.1016/j.jnca.2019.01.016
22. Lee, S., Kim, J., Woo, S., Yoon, C., Scott-Hayward, S., Yegneswaran, V. et. al. (2020). A comprehensive security assessment framework
for software-defined networks. Computers & Security, 91, 101720. doi: http://doi.org/10.1016/j.cose.2020.101720
23. Rana, D. S., Dhondiyal, S. A., Chamoli, S. K. (2019). Software Defined Networking (SDN) Challenges, issues and Solution.
International Journal of Computer Sciences and Engineering, 7 (1), 884–889. doi: http://doi.org/10.26438/ijcse/v7i1.884889
24. Critical Capabilities for WAN Edge Infrastructure. Available at: https://www.gartner.com/doc/reprints?id=1-
1XWDQO33&ct=191210&st=sb Last accessed: 24.08.2021
25. Guo, Z., Feng, W., Liu, S., Jiang, W., Xu, Y., Zhang, Z.-L. (2019). RetroFlow: Maintaining Control Resiliency and Flow
Programmability for Software-Defined WANs. IEEE/ACM International Symposium on Quality of Service (IWQoS ’19). Phoenix,
New York. doi: http://doi.org/10.1145/3326285.3329036
26. Malakhov, S. V., Tarasov, V.N. (2015). Teoreticheskoe i eksperimentalnoe issledovanie zaderzhki v programmnogo-kofiguriruemykh
setiakh. Infokommunikatsionnye tekhnologii, 4, 409–413.
27. Maltsev, A. (2018). Postroenie zaschischennoi i adaptiruemoi seti SD-WAN. Available at: https://www.osp.ru/lan/2018/04/13054564
Last accessed: 29.08.2021
28. Tanha, M. (2019). Resilient Controller Placement Problems in Software Defined Wide-Area Networks. University of Victoria, 130.
68
Information and controlling system
29. Kodavanty, V., Sen, S., Kamsetty, S., Arumugam, P. V. (2019). Pat. No. US 2019/0207844 A1 USA. Determining routing decisions
in a software – defined wide area network. Pub. Date: 04.07.2019.
30. Golani, K., Goswami, K., Bhatt, K., Park, Y. (2018). Fault Tolerant Traffic Engineering in Software-defined WAN. 2018 IEEE
Symposium on Computers and Communications (ISCC). doi: http://doi.org/10.1109/iscc.2018.8538606
31. Sarychev, D. (2021). Kak obespechit bezopasnost programmno-opredeliaemykh setei (SD-WAN). Available at: https://www.anti-
malware.ru/analytics/Technology_Analysis/Secure-SD-WAN Last accessed: 05.09.2021
32. SD-WAN Market Recorded 39 Percent Growth for 1H 2021, According to Dell’Oro Group. Available at: https://www.delloro.com/
news/sd-wan-market-recorded-39-percent-growth-for-1h-2021/ Last accessed: 05.09.2021
33. Galiev, A. (2021). Kak «Kazteleport» v razy sokratil izderzhki na vydelennye kanaly s pomoschiu SD-WAN. Available at:
https://profit.kz/articles/14657/Kak-AO-Kazteleport-v-razi-sokratil-izderzhki-na-videlennie-kanali-s-pomoschu-SD-WAN/
Last accessed: 05.09.2021
34. BI Group modernizirovala set s pomoschiu resheniia SD-WAN ot Fortinet (2021). Available at: https://profit.kz/articles/14700/
BI-Group-modernizirovala-set-s-pomoschu-resheniya-SD-WAN-ot-Fortinet/ Last accessed: 05.09.2021
35. Razbor rynka SD-WAN: kakie suschestvuiut resheniia i komu oni nuzhny (2019). Available at: https://safe.cnews.ru/
articles/2019-11-06_razbor_rynka_sdwan_kakie_sushchestvuyut Last accessed: 06.09.2021
36. Rukovodstvo po sredstvu zaschity SD-WAN dlia rukovoditelei v sfere setevykh tekhnologii. Available at: https://www.fortinet.com/
content/dam/fortinet/assets/white-papers/ru_ru/eBook-The-Network-Leaders-Guide-to-Secure-SD-WAN.pdf Last accessed:
06.09.2021
69