用集中式信誉管理隔离分布式软件定义网络中的恶意控制器

Bilal Karim Mughal, S. Hameed, B. Hameed
{"title":"用集中式信誉管理隔离分布式软件定义网络中的恶意控制器","authors":"Bilal Karim Mughal, S. Hameed, B. Hameed","doi":"10.14257/IJFGCN.2018.11.5.02","DOIUrl":null,"url":null,"abstract":"Although software-defined networks have seen a sharp increase in their deployment around the world, with big tech companies including Microsoft and Google, to name a few, tapping into the enormous potential that these networks offer, there are still various security loopholes that need to be plugged. One such security-related issues is that of a rogue controller bringing down an entire network. As we shall see in this paper, this problem is still short of any definitive solutions, especially when it comes to distributed software-defined networks. We attempt to resolve this issue by developing a centrally managed trust and reputation scheme. By proactively comparing the policies/flow rules that need to be installed in the switches with those that are actually installed, our scheme singles out a malicious controller. We have evaluated the scheme for scalability, message overhead, and for bad-mouthing attacks. Our results suggest that using trust and reputation system can greatly enhance the network security in this scenario as demonstrated by rigorous evaluations in Emulab network emulation testbed.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Isolating Malicious Controller(s) In Distributed Software-Defined Networks with Centralized Reputation Management\",\"authors\":\"Bilal Karim Mughal, S. Hameed, B. Hameed\",\"doi\":\"10.14257/IJFGCN.2018.11.5.02\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although software-defined networks have seen a sharp increase in their deployment around the world, with big tech companies including Microsoft and Google, to name a few, tapping into the enormous potential that these networks offer, there are still various security loopholes that need to be plugged. One such security-related issues is that of a rogue controller bringing down an entire network. As we shall see in this paper, this problem is still short of any definitive solutions, especially when it comes to distributed software-defined networks. We attempt to resolve this issue by developing a centrally managed trust and reputation scheme. By proactively comparing the policies/flow rules that need to be installed in the switches with those that are actually installed, our scheme singles out a malicious controller. We have evaluated the scheme for scalability, message overhead, and for bad-mouthing attacks. Our results suggest that using trust and reputation system can greatly enhance the network security in this scenario as demonstrated by rigorous evaluations in Emulab network emulation testbed.\",\"PeriodicalId\":45234,\"journal\":{\"name\":\"International Journal of Future Generation Communication and Networking\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Future Generation Communication and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJFGCN.2018.11.5.02\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Future Generation Communication and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJFGCN.2018.11.5.02","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

尽管软件定义网络在世界各地的部署急剧增加,包括微软和谷歌在内的大型科技公司利用了这些网络提供的巨大潜力,但仍有各种安全漏洞需要堵塞。其中一个与安全相关的问题是流氓控制器导致整个网络瘫痪。正如我们将在本文中看到的,这个问题仍然缺乏任何明确的解决方案,尤其是当涉及到分布式软件定义网络时。我们试图通过制定一个集中管理的信托和声誉计划来解决这个问题。通过主动比较需要安装在交换机中的策略/流规则与实际安装的策略/流程规则,我们的方案挑出了一个恶意控制器。我们已经评估了该方案的可扩展性、消息开销和恶意攻击。我们的研究结果表明,在这种情况下,使用信任和信誉系统可以大大提高网络安全性,Emulab网络仿真试验台的严格评估证明了这一点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Isolating Malicious Controller(s) In Distributed Software-Defined Networks with Centralized Reputation Management
Although software-defined networks have seen a sharp increase in their deployment around the world, with big tech companies including Microsoft and Google, to name a few, tapping into the enormous potential that these networks offer, there are still various security loopholes that need to be plugged. One such security-related issues is that of a rogue controller bringing down an entire network. As we shall see in this paper, this problem is still short of any definitive solutions, especially when it comes to distributed software-defined networks. We attempt to resolve this issue by developing a centrally managed trust and reputation scheme. By proactively comparing the policies/flow rules that need to be installed in the switches with those that are actually installed, our scheme singles out a malicious controller. We have evaluated the scheme for scalability, message overhead, and for bad-mouthing attacks. Our results suggest that using trust and reputation system can greatly enhance the network security in this scenario as demonstrated by rigorous evaluations in Emulab network emulation testbed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊介绍: The topics covered by IJFGCN include the following:- -Communication Basic and Infrastructure: *Algorithms, Architecture, and Infrastructures *Communication protocols *Communication Systems *Telecommunications *Transmission TechniquesEtc. -Networks Basic and Management: *Network Management Techniques *Network Modeling and Simulation *Network Systems and Devices *Networks Security, Encryption and Cryptography *Wireless Networks, Ad-Hoc and Sensor Networks *Etc. -Multimedia Application: *Digital Rights Management *Documents Monetization and Interpretation *Management and Diffusion of Multimedia Applications *Multimedia Data Base *Etc. -Image, Video, Signal and Information Processing: *Analysis and Processing *Compression and Coding *Information Fusion *Rationing Methods and Data mining *Etc.
期刊最新文献
Mitigation of Interference in Uplink Spectrum by Shifting Handover Boundary in LTE Heterogeneous Networks Ear Based Human Identification Using a Combination of Wavelets and Multi-Scale Local Binary Pattern WLAN-WIMAX Scheduler-Based Hybrid Sensor Network for Data Aggregation in Smart Grid Wireless Power Transfer Using Inductive Coupling Principle for Portable Charging Devices through Solar Photovoltaic with Auto Switching MANET: A Survey on Machine Learning-Based Intrusion Detection Approaches
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1