DACAS: integration of attribute-based access control for northbound interface security in SDN

被引:3
|
作者
Liu, Yifan [1 ]
Zhao, Bo [1 ]
An, Yang [2 ]
Guo, Jiabao [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Hubei, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Software-Defined Networking (SDN); Northbound interface security; ABAC; Controller security; Ryu; MANAGEMENT FRAMEWORK; ARCHITECTURE;
D O I
10.1007/s11280-022-01130-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Software-Defined Networking (SDN) allows apps to interact with network-critical resources at the control plane through northbound interface, people hope that these apps have the same level of trust as the controller. Most researchers use static access control policies to solve this problem. In this paper, we achieve a dynamic access control model called DACAS, which is an implementation of attribute-based access control (ABAC) model in the context of the SDN control plane. We analyze how applications can influence SDN through northbound interface and the security requirements of the permission on mainstream controllers. In addition to the security issues caused by the misuse of sensitive APIs, it is found that the northbound and southbound interfaces share the same bandwidth in the network. Once the bandwidth is saturated with requests from the northbound interface, the southbound interface may lose packets. In addition, the storage space of switches is limited. Malicious applications can occupy the living space of normal flow tables by inserting a large number of redundant flow rules. In order to solve these problems, we use the linear quadratic exponential smoothing method to calculate the threshold of inserting flow entries and the upper limit of access time, which can help us implement dynamic access control scheme. In addition, the existing static access control scheme do not take the dynamic or random behavior of the apps into account, which means they cannot adapt to the changing situation in reality. DACAS achieves fine-grained permission management by designing single-case filters and multi-case filters. The prototype system of DACAS is implemented on Ryu controller. Through feasibility analysis, functional evaluation, performance evaluation and security analysis, we demonstrate the robustness and extensibility of DACAS.The run-time overhead introduced by DACAS is on the order of microseconds, which is about 2 ms, but the flexibility of the system is greatly increased by increasing the context attribute in DACAS.
引用
收藏
页码:2143 / 2173
页数:31
相关论文
共 50 条
  • [41] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
  • [42] Attribute-based access control policies composition algebra
    Lin, Li
    Huai, Jin-Peng
    Li, Xian-Xian
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
  • [43] Towards Integrating Attribute-Based Access Control into Ontologies
    Dundua, Besik
    Rukhaia, Mikheil
    2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 1052 - 1056
  • [44] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (02) : 194 - 206
  • [45] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [46] Evolutionary Inference of Attribute-Based Access Control Policies
    Medvet, Eric
    Bartoli, Alberto
    Carminati, Barbara
    Ferrari, Elena
    EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365
  • [47] An attribute-based access control model for Web services
    Shen Hai-bo
    Hong Fan
    SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 74 - +
  • [48] Attribute-Based Access Control of Collaborative design systems
    Fan, Tongrang
    Guo, Hongyong
    Li, Yanjing
    MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 80 - 85
  • [49] On the Feasibility of Attribute-Based Encryption for WLAN Access Control
    Pisa, Claudio
    Dargahi, Tooska
    Caponi, Alberto
    Bianchi, Giuseppe
    Blefari-Melazzi, Nicola
    2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
  • [50] Firewall for Attribute-Based Access Control in Smart Grids
    Ruland, Christoph
    Sassmannshausen, Jochen
    2018 THE 6TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE 2018), 2018, : 336 - 341