DACAS: integration of attribute-based access control for northbound interface security in SDN

被引:3
|
作者
Liu, Yifan [1 ]
Zhao, Bo [1 ]
An, Yang [2 ]
Guo, Jiabao [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Hubei, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Software-Defined Networking (SDN); Northbound interface security; ABAC; Controller security; Ryu; MANAGEMENT FRAMEWORK; ARCHITECTURE;
D O I
10.1007/s11280-022-01130-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Software-Defined Networking (SDN) allows apps to interact with network-critical resources at the control plane through northbound interface, people hope that these apps have the same level of trust as the controller. Most researchers use static access control policies to solve this problem. In this paper, we achieve a dynamic access control model called DACAS, which is an implementation of attribute-based access control (ABAC) model in the context of the SDN control plane. We analyze how applications can influence SDN through northbound interface and the security requirements of the permission on mainstream controllers. In addition to the security issues caused by the misuse of sensitive APIs, it is found that the northbound and southbound interfaces share the same bandwidth in the network. Once the bandwidth is saturated with requests from the northbound interface, the southbound interface may lose packets. In addition, the storage space of switches is limited. Malicious applications can occupy the living space of normal flow tables by inserting a large number of redundant flow rules. In order to solve these problems, we use the linear quadratic exponential smoothing method to calculate the threshold of inserting flow entries and the upper limit of access time, which can help us implement dynamic access control scheme. In addition, the existing static access control scheme do not take the dynamic or random behavior of the apps into account, which means they cannot adapt to the changing situation in reality. DACAS achieves fine-grained permission management by designing single-case filters and multi-case filters. The prototype system of DACAS is implemented on Ryu controller. Through feasibility analysis, functional evaluation, performance evaluation and security analysis, we demonstrate the robustness and extensibility of DACAS.The run-time overhead introduced by DACAS is on the order of microseconds, which is about 2 ms, but the flexibility of the system is greatly increased by increasing the context attribute in DACAS.
引用
收藏
页码:2143 / 2173
页数:31
相关论文
共 50 条
  • [1] DACAS: integration of attribute-based access control for northbound interface security in SDN
    Yifan Liu
    Bo Zhao
    Yang An
    Jiabao Guo
    World Wide Web, 2023, 26 : 2143 - 2173
  • [2] Integration of Attribute-based Access Control into Automotive Architectures
    Rumez, Marcel
    Duda, Alexander
    Gruender, Patrick
    Kriesten, Reiner
    Sax, Eric
    2019 30TH IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV19), 2019, : 1916 - 1922
  • [3] BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET
    Weng, Jia-Si
    Weng, Jian
    Zhang, Yue
    Luo, Weiqi
    Lan, Weiming
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (01) : 822 - 831
  • [4] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [5] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [6] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [7] A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing
    BenMarak, Omessead
    Naanaa, Anis
    Elasmi, Sadok
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 3, AINA 2024, 2024, 201 : 415 - 425
  • [8] CRYPTOGRAPHIC ACCESS CONTROL FOR MANDATORY SECURITY POLICIES USING ATTRIBUTE-BASED ENCRYPTION
    Plecan, Daniel
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2017, 18 : 413 - 429
  • [9] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [10] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48