期刊文献+

软件定义网络中流规则安全性研究进展 被引量:1

Advances in security analysis of software-defined networking flow rules
下载PDF
导出
摘要 随着网络功能的日益多元化,具有集中控制与可编程性的软件定义网络(SDN)架构已在众多领域被广泛应用。然而,SDN特有的层次结构与运行机制也引入了新的安全挑战,其中,流规则作为控制平面管理决策的载体和数据平面网络行为的依据,已成为SDN网络攻防的重点。针对SDN中流规则的安全性问题,首先分析了SDN架构的特点及安全隐患。再基于SDN中的流规则机制,将针对流规则的攻击分为干扰控制平面决策和破坏数据平面执行两类,并介绍了攻击实例。对于提升流规则安全性的研究,分别从检验与增强两个方面展开分析,总结了现有的实现机制并简要分析了其存在的局限性。其中,分析探讨了基于建模检测和基于数据包探测的两种主流的检验方案,介绍讨论了基于权限控制、基于冲突解决和基于路径验证的3种具体的流规则增强思路。最后,展望了流规则安全性未来的发展方向。 With the increasing diversification of network functions,the software-defined networking(SDN)architecture,which provides centralized network control and programmability,has been deployed in various fields.However,the unique hierarchical structure and operation mechanism of SDN also introduce new security challenges,among which as the carrier of control plane management decisions and the basis of data plane network behavior,flow rules have become the focus of SDN attack and defense.Aiming at the security issues of flow rules in SDN,this paper first reviews the characteristics and security risks of the SDN architecture.Based on the mechanism of flow rules in SDN,the attacks against flow rules are systematically divided into two categories,namely,interference of control plane decision and violation in data plane implementation,with the attack examples introduced.Then,the methods for improving the security of flow rules are analyzed and classified into two categories,i.e.,checking and enhancing the security of flow rules.Furthermore,existing implementation mechanisms are summarized with their limitations briefly analyzed.In terms of flow rule security checking,two mainstream methods,i.e.,model-based checking and test-packet-based checking,are analyzed and discussed.In terms of flow rule security enhancement,three specific ideas based on permission control,conflict resolution and path verification are introduced and discussed.Finally,the future research trends of flow rule security are prospected.
作者 熊婉寅 毛剑 刘子雯 刘文懋 刘建伟 XIONG Wanyin;MAO Jian;LIU Ziwen;LIU Wenmao;LIU Jianwei(School of Cyber Science and Technology,Beihang University,Beijing 100191,China;NSFocus Inc.,Beijing 100089,China)
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2023年第6期172-194,共23页 Journal of Xidian University
基金 国家自然科学基金(62172027) 浙江省自然科学基金资助项目(LZ23F020013) 北京市自然科学基金(6202036)。
关键词 软件定义网络 流规则 网络安全 网络验证 网络测试 software-defined networking flow rule network security network verification network testing
  • 相关文献

参考文献8

二级参考文献79

  • 1Open Networking Fundation. SDN [EB/OL]. [2013-08-03]. https://www.opennetworking.org.
  • 2Tootoonchian A, Ghobadi M, Ganjali Y. OpenTM: Traffic Matrix Estimator for OpenFlow Networks [C]//Proceedings of the 11th International Conference on Passive and Active Measurement (PAM). Heidelberg: Springer, 2010: 201-210.
  • 3Jose L, Yu M, Rexford J. Online Measurement of Large Traffic Aggregates on Commodity Switches [C]//Proceedings of the 11th USENIX Conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE). Berkeley: USENIX Association, 2011: 13.
  • 4Braga R, Mota E, Passito A. Lightweight DDoS Flooding Attack Detection Using NOX/OpenFlow [C]//IEEE 35th Conference on Local Computer Networks. Piscataway: IEEE, 2010: 408-415.
  • 5Mehdi S A, Khalid J, Khayam S A. Revisiting Traffic Anomaly Detection Using Software Defined Networking [C]//Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection. Heidelberg: Springer, 2011: 161-180.
  • 6Mckeown N, Anderson T, Balakrishnan H, et al. OpenFlow: Enabling Innovation in Campus Networks [J]. ACM SIGCOMM Computer Communication Review, 2008, 38(2): 69-74.
  • 7Nychis G, Sekar V, Andersen D G, et al. An Empirical Evaluation of Entropy-based Traffic Anomaly Detection [C]//Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement. New York: ACM, 2008: 151-156.
  • 8Lakhina A, Crovella M, Diot C. Diagnosing Network-wide Traffic Anomalies [C]//Proceedings of the ACM SIGCOMM. New York: ACM, 2004: 219-230.
  • 9Lakhina A, Crovella M, Diot C. Mining Anomalies Using Traffic Feature Distributions [C]//Proceedings of the ACM SIGCOMM. New York: ACM, 2005: 134-145.
  • 10Soule A, Salamatian K, Taft N. Combining Filtering and Statistical Methods for Anomaly Detection [C]//Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement. Berkeley: USENIX Association, 2005: 31.

共引文献189

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部