期刊文献+

基于拟态防御理论的SDN控制层安全机制研究 被引量:7

Research on security mechanism for SDN control layer based on mimic defense theory
下载PDF
导出
摘要 针对现阶段软件定义网络(SDN)控制层流规则窜改攻击以及单点脆弱性问题,提出一种基于动态异构冗余的拟态安全控制器模型,通过分布式冗余架构以及一致性判决机制提高系统可靠性,利用调度机制实现系统动态性以及结合异构因素提高系统安全性,通过一致性容错算法(consistency and fault detection algorithm,CFDA)实现安全数据处理与错误检测,并提高控制器集群动态、可扩展性。仿真结果表明,对于控制器集群网络而言CFDA具有较低的通信复杂度,降低了节点冗余度要求;同时,冗余体的增加可以非线性降低系统被攻击成功概率,而适当的调度策略大大提高了系统安全率,因此拟态安全控制器机制能够有效提高攻击者攻击难度,增加系统安全可靠性。 Aiming at the problem of flow rules tampering attack as well as single point vulnerability in SDN control layer,this paper proposed a mimic security controller model based on dynamic heterogeneous redundancy. The proposed model used distributed architecture and consistency decision mechanism to improve the system reliability,scheduling mechanism to achieve system dynamics and the combination of heterogeneous factors to improve system security. It designed a consistency fault-tolerant algorithm CFDA to achieve safe data processing with fault detection and scalability. Simulation experiments show that the proposed algorithm has lower communication complexity for the controller cluster network and reduces the multi-controller node redundancy requirements,and that the mimic security controller mechanism can effectively improve the attacker's difficulty,which increases the safety factor and reliability of the system.
作者 顾泽宇 张兴明 林森杰 Gu Zeyu;Zhang Xingming;Lin Senjie(National Digital Switching System Engineering & Technological R&D Center,Zhengzhou 450002,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第7期2148-2152,共5页 Application Research of Computers
基金 国家自然科学基金面上项目(61572520) 国家自然科学基金创新研究群体项目(61521003)
关键词 SDN控制层 流规则窜改 单点脆弱性 动态异构冗余 调度机制 一致性与错误检测 SDN control layer flow rule tampering attack single point vulnerability dynamic heterogeneous redundancy scheduling mechanism consistency and fault detection
  • 相关文献

参考文献4

二级参考文献64

  • 1李之棠,徐晓丹.动态蜜罐技术分析与设计[J].华中科技大学学报(自然科学版),2005,33(2):86-88. 被引量:19
  • 2Open Networking Foundation. Software-defined networking: the new norm for networks [ R/OL]. [ 2013-11 - 16 ]. https ://www. opennet- working, org/images/stories/downloads/sdnresources/white-papers/ wpsdn-newnorm, pdf.
  • 3ZARGAR S T, JOSHI J, TIPPER D. A survey of defense mechanisms against distributed denial of service ( DDoS ) flooding attacks [ J ]. IEEE Communications Surveys & Tutorials,2013,15 (4) :2046- 2069.
  • 4ZHOU Wan-lei. Keynote Ⅲ: detection and traceback of DDoS attacks [C]//Proc of the 8th IEEE International Conference on Computer and Information Technology. [ S. l. ] :IEEE Press,2008.
  • 5Real time threat mitigation through intelligent network quarantine [ EB/OL ]. [ 2013- 11- 18 ]. http://www, opennetsummit, org/ar- chives/apr12/site/pdf/varmour, pdf.
  • 6PORRAS P, SHIN S, YEGNESWARAN V, et al. A security en- forcement kernel for OpenFlow networks [ C ]//Proc of the 1 st Work- shop on Hot Topics in Software Defined Networks. New York : ACM Press,2012 : 121 - 126.
  • 7ANTONATOS S, AKRITIDIS P, MARKATOS E P, et al. Defending against hitlist worms using network address space randomization [ J ]. Computer Networks ,2007,51 ( 12 ) :3471-3490.
  • 8JAFARIAN H J, AI-S E, DUAN Qi. OpenFlow random host muta-tlon : transparent moving target defense using software defined networ- king[C]//Proc of the 1st Workshop on Hot Topics in Software De- fined Networks. New York :ACM Press ,2012 : 127-132.
  • 9KUMAR S, SEHGAL R, BHATIA J S. Hybrid honeypot framework for malware collection and analysis [ C ]//Proe of the 7th International Conference on Industrial and Information Systems. [ S. 1. ] : IEEE Press.2012 : 1-5.
  • 10YEGANEH S H, GANJALI Y. Kandoo: a framework for efficient and scalable offloading of control applications [ C ]//Proc of the 1 st Work- shop on Hot Topics in Software Defined Networks. New York:ACM Press,2012 : 19-24.

共引文献286

同被引文献53

引证文献7

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部