A security policy model transformation and verification approach for software defined networking

被引:2
|
作者
Meng, Yunfei [1 ]
Huang, Zhiqiu [1 ]
Shen, Guohua [1 ]
Ke, Changbo [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
SDN; Security policy model; Model transformation; Security policy verification; Model checking;
D O I
10.1016/j.cose.2020.102089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networking (SDN) has been increasingly utilized to enforce the security of complex networks. However SDN-based security enforcement mechanisms rely heavily on some specific security policies containing underlying network information. Facing the increasingly complex and huge SDN networks, we urgently need a novel security policy management mechanism which can be completely transparent to any underlying network information. That is it can permit network managers to define the high-level security policy model without containing any underlying information, and by means of model transformation, high-level security policy model can be automatically transformed into its corresponding lower-level security policy model containing underlying information. Moreover, we must ensure the system model of data plane updated by the low-level security policy model can hold all of security properties defined in high-level security policy model. Based on these insights, we propose a security policy model transformation and verification approach for SDN in this paper. We first specify the security policies used in SDN networks as a formal security policy model (SPM). Then we establish the system model of SDN's data plane and the mapping rules between the policy objects of SPM and the system objects of system model of data plane. Based on these mapping rules, we propose a security policy model transformation mechanism which transforms SPM into the low-level security policy model, RSPM. In order to verify the system model of data plane updated by RSPM can hold all of security properties defined in SPM, we propose a security policy verification mechanism based on model checking techniques and a group of validation conditions. Finally, we utilize a comprehensive case to illustrate the feasibility of this approach. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] A model transformation based security policy automatic management framework for software-defined networking
    Meng, Yunfei
    Ke, Changbo
    Huang, Zhiqiu
    COMPUTERS & SECURITY, 2024, 142
  • [2] Leveraging software-defined networking for security policy enforcement
    Liu, Jiaqiang
    Li, Yong
    Wang, Huandong
    Jin, Depeng
    Su, Li
    Zeng, Lieguang
    Vasilakos, Thanos
    INFORMATION SCIENCES, 2016, 327 : 288 - 299
  • [3] Software defined networking: security model, threats and mechanism
    Wang M.-M.
    Liu J.-W.
    Chen J.
    Mao J.
    Mao K.-F.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (04): : 969 - 992
  • [4] MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking
    Achleitner, Stefan
    Burke, Quinn
    McDaniel, Patrick
    Jaeger, Trent
    La Porta, Thomas
    Krishnamurthy, Srikanth
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01): : 729 - 744
  • [5] Security Enhancement in Software Defined Networking (SDN): A Threat Model
    Sharma, Pradeep Kumar
    Tyagi, S. S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (09) : 208 - 217
  • [6] Verification Framework for Software-Defined Networking
    Kang, Miyoung
    Cho, Jong Jin
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 518 - 523
  • [7] A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking
    Eom, Taehoon
    Hong, Jin B.
    An, Seongmo
    Park, Jong Sou
    Kim, Dong Seong
    IEEE ACCESS, 2019, 7 : 137432 - 137445
  • [8] A Taxonomy-based Approach for Security in Software-Defined Networking
    Banse, Christian
    Schuette, Julian
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [9] OpenSec: Policy-Based Security Using Software-Defined Networking
    Lara, Adrian
    Ramamurthy, Byrav
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2016, 13 (01): : 30 - 42
  • [10] Security in Software-Defined-Networking: A Survey
    Yao, Zhen
    Yan, Zheng
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 319 - 332