An SDN-Based Approach to Enhance the End-to-End Security: SSL/TLS Case Study

被引:0
|
作者
Ranjbar, Alireza [1 ]
Komu, Miika [1 ]
Salmela, Patrik [1 ]
Aura, Tuomas [2 ]
机构
[1] Ericsson Res, Helsinki, Finland
[2] Aalto Univ, Espoo, Finland
关键词
Software-Defined Networking; SSL/TLS; Centralized policy management; Handshake analysis; Flow verification;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
End-to-end encryption is becoming the norm for many applications and services. While this improves privacy of individuals and organizations, the phenomenon also raises new kinds of challenges. For instance, with the increase of devices using encryption, the volumes of outdated, exploitable encryption software also increases. This may create some distrust amongst the users against security unless its quality is enforced in some ways. Unfortunately, deploying new mechanisms at the end-points of the communication is challenging due to the sheer volume of devices, and modifying the existing services may not be feasible either. Hence, we propose a novel method for improving the quality of the secure sessions in a centralized way based on the SDN architecture. Instead of inspecting the encrypted traffic, our approach enhances the quality of secure sessions by analyzing the plaintext handshake messages exchanged between a client and server. We exploit the fact that many of today's security protocols negotiate the security parameters such as the protocol version, encryption algorithms or certificates in plaintext in a protocol handshake before establishing a secure session. By verifying the negotiated information in the handshake, our solution can improve the security level of SSL/TLS sessions. While the approach can be extended to many other protocols, we focus on the SSL/TLS protocol in this paper because of its wide-spread use. We present our implementation for the OpenDaylight controller and evaluate its overhead to SSL/TLS session establishment in terms of latency.
引用
收藏
页码:281 / 288
页数:8
相关论文
共 50 条
  • [21] An End-to-End Security Auditing Approach for Service Oriented Architectures
    Azarmi, Mehdi
    Bhargava, Bharat
    Angin, Pelin
    Ranchal, Rohit
    Ahmed, Norman
    Sinclair, Asher
    Linderman, Mark
    Ben Othmane, Lotfi
    2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 279 - 284
  • [22] Improved End-to-End Data Security Approach for Cloud Computing
    Ghosh, Soumalya
    Verma, Shiv Kumar
    Ghosh, Uttam
    Al-Numay, Mohammed
    SUSTAINABILITY, 2023, 15 (22)
  • [23] A Bayesian Multi-Armed Bandit Algorithm for Dynamic End-to-End Routing in SDN-Based Networks with Piecewise-Stationary Rewards
    Santana, Pedro
    Moura, Jose
    ALGORITHMS, 2023, 16 (05)
  • [24] Evaluation of an End-to-End Delay Estimation in the Case of Multiple Flows in SDN Networks
    Huu-Nghi Nguyen
    Begin, Thomas
    Busson, Anthony
    Lassous, Isabelle Guerin
    2016 12TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT AND WORKSHOPS(CNSM 2016), 2016, : 336 - 341
  • [26] Link Capacity Estimation in SDN-based End-hosts
    Al-Najjar, Anees
    Pakzad, Farzaneh
    Layeghy, Siamak
    Portmann, Marius
    2016 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2016,
  • [27] End-to-End Dynamic Bandwidth Resource Allocation Based on QoS Demand in SDN
    Thazin, Nwe
    Nwe, Khine Moe
    Ishibashi, Yutaka
    PROCEEDINGS OF 2019 25TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2019, : 244 - 249
  • [28] An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security
    Priyanka, R.
    Reddy, K. Satyanarayan
    INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2022, 13 (07):
  • [29] Hierarchical Identity Based Cryptography for End-to-End Security in DTNs
    Patra, Rabin
    Surana, Sonesh
    Nedevschi, Sergiu
    2008 IEEE 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2008, : 223 - 230
  • [30] END-TO-END SECURITY: AN APPROACH TO A NATIONAL NETWORK FOR TELE-COOPERATION
    Staemmler, M.
    Walz, M.
    Weisser, G.
    Engelmann, U.
    Weininger, R.
    Ernstberger, A.
    Sturm, J.
    EHEALTH2012 - HEALTH INFORMATICS MEETS EHEALTH - VON DER WISSENSCHAFT ZUR ANWENDUNG UND ZURUCK: MOBILE HEALTH & CARE - GESUNDHEITSVORSORGE IMMER UND UBERALL, 2012, : 109 - 114