Hop-by-Hop Verification Mechanism of Packet Forwarding Path Oriented to Programmable Data Plane

被引:1
|
作者
Zeng, Junsan [1 ]
Liu, Ying [1 ]
Zhang, Weiting [1 ]
Yan, Xincheng [2 ,3 ]
Zhou, Na [2 ,3 ]
Jiang, Zhihong [2 ,3 ]
机构
[1] Beijing Jiaotong Univ, Natl Engn Res Ctr Adv Network Technol, Beijing, Peoples R China
[2] State Key Lab Mobile Network & Mobile Multimedia, Shenzhen 518055, Peoples R China
[3] ZTE Corp, Nanjing 210012, Peoples R China
关键词
Path verification; SDN; P4; INT; NETWORKS;
D O I
10.1007/978-981-19-9697-9_37
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attacks against the forwarding path could deviate data packets from the predefined route to achieve ulterior purposes, which has posed a serious threat to the software-defined network. Previous studies attempted to solve this security issue through complex authentication or traffic statistics methods. However, existing schemes have the disadvantages of high bandwidth overhead and high process delay. Hence, this article proposed a lightweight forwarding path verification mechanism based on P4 implementation. First, we deployed inband network telemetry to obtain path information, and then performed the path verification inside each hop in the programmable data plane to ensure that various attacks against forwarding paths could be intercepted. Finally, complete path verification information would convey to the control plane for backup. Corresponding experimental results demonstrate that our mechanism can effectively improve the security of the packet forwarding path with acceptable throughput and delay.
引用
收藏
页码:454 / 466
页数:13
相关论文
共 50 条
  • [31] Dynamic load distribution with hop-by-hop forwarding based on max-min one-way delay
    Chen Fei
    Wu ChunMing
    Wang Bin
    Qian YaGuan
    Wu XiaoChun
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (06) : 1 - 12
  • [32] AI-Driven Packet Forwarding With Programmable Data Plane: A Survey
    Quan, Wei
    Xu, Ziheng
    Liu, Mingyuan
    Cheng, Nan
    Liu, Gang
    Gao, Deyun
    Zhang, Hongke
    Shen, Xuemin
    Zhuang, Weihua
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 762 - 790
  • [33] Dynamic load distribution with hop-by-hop forwarding based on max-min one-way delay
    CHEN Fei
    WU ChunMing
    WANG Bin
    QIAN YaGuan
    WU XiaoChun
    ScienceChina(InformationSciences), 2014, 57 (06) : 113 - 124
  • [34] An Improved Hop-by-hop Interest Shaper for Congestion Control in Named Data Networking
    Wang, Yaogong
    Rozhnova, Natalya
    Narayanan, Ashok
    Oran, David
    Rhee, Injong
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04)
  • [35] An efficient path selection algorithm for on-demand link-state hop-by-hop routing
    Roy, S
    Garcia-Lina-Aceves, JJ
    ELEVENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2002, : 561 - 564
  • [36] Fair hop-by-hop interest rate control to mitigate congestion in named data networks
    Haifa Touati
    Safa Mejri
    Naceur Malouch
    Farouk Kamoun
    Cluster Computing, 2021, 24 : 2213 - 2230
  • [37] Fair hop-by-hop interest rate control to mitigate congestion in named data networks
    Touati, Haifa
    Mejri, Safa
    Malouch, Naceur
    Kamoun, Farouk
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 2213 - 2230
  • [38] Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
    Zhu, Sencun
    Setia, Sanjeev
    Jajodia, Sushil
    Ning, Peng
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2007, 3 (03)
  • [39] A Hop-by-hop Window-based Congestion Control Method for Named Data Networking
    Kato, Takahiko
    Bandai, Masaki
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [40] An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    Zhu, S
    Setia, S
    Jajodia, S
    Ning, P
    2004 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2004, : 259 - 271