期刊文献+

基于符号模型的Mynah协议安全性自动化分析

Automatic Analysis of Security of Mynah Protocol Based on Symbolic Model
下载PDF
导出
摘要 Openflow是目前使用最为广泛的SDN通信协议,由于其协议规范还在不断完善,因此存在一定的安全隐患,对Openflow协议及其相关应用的安全分析也越来越受到重视。Mynah协议是在Openflow协议的基础上实现的安全认证协议。对Mynah协议的保密性和认证性进行分析,基于符号模型,利用应用PI演算对Mynah协议进行形式化建模,并使用安全协议分析工具Proverif进行自动化分析。结果表明,Mynah协议并不具备保密性和认证性,为此,给出了Mynah协议中不具备保密性和认证性的解决办法。 Openflow is the most popular sdn protocol and widely used till now,as the protocol is still in the process of completing so that it has protential safety hazards and more attention has been paid on the issue.Mynah is a security protocol based on openflow and in this paper we analyse the pravicy and authentication of the protocol based on symbolic model,formalized with the Applied PI calculus in the symbolic model and use automatic tool ProVerif to analyse automatically.The results indicate that the Mynah protocol is lack of privacy and authentication.Finally the solutions for the problem of no privacy and authentication in Mynah protocol are presented.
作者 李镜
出处 《软件导刊》 2017年第5期164-167,共4页 Software Guide
关键词 SDN安全 Openflow协议 应用PI演算 符号模型 自动化分析 SDN Security Openflow Protocol Authentication Symbolic Mode Automatic Analysis
  • 相关文献

参考文献1

二级参考文献65

  • 1Mckeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J. OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 2008,38(2):69-74. [doi: 10.1145/1355734. 1355746].
  • 2Elliott C. GENI: Opening up new classes of experiments in global networking. IEEE Internet Computing, 2010,14(1):39-42.
  • 3Gavras A, Karila A, Fdida S, May M, Potts M. Future Internet research and experimentation: The FIRE initiative. ACM SIGCOMM Computer Communication Review, 2007,37(3):89-92. [doi: 10.114511273445.1273460].
  • 4JGN2plus. 2012. http://www.jgn.nict.go.jp/english/index.html.
  • 5SOFIA. 2012. http://fi.ict.ac.cn/research/sofia_overview.htm.
  • 6Yang L, Dantu R, Anderson T, Gopal R. Forwarding and Control Element Separation (ForCES) Framework. RFC 3746, 2004. http://tools.ietf.org/html/rfc3746.
  • 7Greenberg A, Hjalmtysson G, Maltz DA, Myers A, Rexford J, Xie G, Yan H, Zhan J, Zhang H. A clean slate 4D approach to network control and management. ACM SIGCOMM Computer Communication Review, 2005,35(5):41-54. [doi: 10.1145/1096536. 1096541].
  • 8Caesar M, Caldwell D, Feamster N, Rexford J, Shaikh A, Merwe J. Design and implementation of a routing control platform. In: Proc. of the 2rd USENIX Symp. on Networked Systems Design and Implementation (NSDI). Boston: USENIX Association, 2005. 15-28.
  • 9Casado M, Garfinkel T, Akella A, Freedman MJ, Boneh D, Mckeown N, Shenker S. SANE: A protection architecture for enterprise networks. In: Proc. of the 15th Conf. on USENIX Security Symp. Vancouver: USENIX Association, 2006. 137-151.
  • 10Casado M, Freedman MJ, Pettit J, Luo J, Mckeown N, Shenker S. Ethane: Taking control of the enterprise. In: Proc. of the SIGCOMM 2007. Kyoto: ACM Press, 2007. 1-12. [doi: 10.1145/1282380.1282382].

共引文献421

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部