A security policy model transformation and verification approach for software defined networking

被引:2
|
作者
Meng, Yunfei [1 ]
Huang, Zhiqiu [1 ]
Shen, Guohua [1 ]
Ke, Changbo [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
SDN; Security policy model; Model transformation; Security policy verification; Model checking;
D O I
10.1016/j.cose.2020.102089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networking (SDN) has been increasingly utilized to enforce the security of complex networks. However SDN-based security enforcement mechanisms rely heavily on some specific security policies containing underlying network information. Facing the increasingly complex and huge SDN networks, we urgently need a novel security policy management mechanism which can be completely transparent to any underlying network information. That is it can permit network managers to define the high-level security policy model without containing any underlying information, and by means of model transformation, high-level security policy model can be automatically transformed into its corresponding lower-level security policy model containing underlying information. Moreover, we must ensure the system model of data plane updated by the low-level security policy model can hold all of security properties defined in high-level security policy model. Based on these insights, we propose a security policy model transformation and verification approach for SDN in this paper. We first specify the security policies used in SDN networks as a formal security policy model (SPM). Then we establish the system model of SDN's data plane and the mapping rules between the policy objects of SPM and the system objects of system model of data plane. Based on these mapping rules, we propose a security policy model transformation mechanism which transforms SPM into the low-level security policy model, RSPM. In order to verify the system model of data plane updated by RSPM can hold all of security properties defined in SPM, we propose a security policy verification mechanism based on model checking techniques and a group of validation conditions. Finally, we utilize a comprehensive case to illustrate the feasibility of this approach. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] A Software-Defined Networking Security Controller Architecture
    Shang, Fengjun
    Fu, Qiang
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 229 - 234
  • [22] Improving Security in Internet of Things with Software Defined Networking
    Vilalta, Ricard
    Ciungu, Raluca
    Mayoral, Arturo
    Casellas, Ramon
    Martinez, Ricardo
    Pubill, David
    Serra, Jordi
    Munoz, Raul
    Verikoukis, Christos
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [23] SOFTWARE-DEFINED NETWORKING SECURITY: PROS AND CONS
    Dabbagh, Mehiar
    Hamdaoui, Bechir
    Guizani, Mohsen
    Rayes, Ammar
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 : 73 - 79
  • [24] Security Challenges and Opportunities of Software-Defined Networking
    Dacier, Marc C.
    Koenig, Hartmut
    Cwalinski, Radoslaw
    Kargl, Frank
    Dietrich, Sven
    IEEE SECURITY & PRIVACY, 2017, 15 (02) : 96 - 100
  • [25] Security and Performance Modeling and Optimization for Software Defined Networking
    Eom, Taehoon
    Hong, Jin B.
    An, SeongMo
    Park, Jong Sou
    Kim, Dong Seong
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 610 - 617
  • [26] Policy Transformation in Software Defined Networks
    Kang, Nanxi
    Reich, Joshua
    Rexford, Jennifer
    Walker, David
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (04) : 309 - 310
  • [27] Verifiable Policy-defined Networking for Security Management
    Ranathunga, Dinesha
    Roughan, Matthew
    Kernick, Phil
    Falkner, Nick
    Nguyen, Hung
    Mihailescu, Marian
    McClintock, Michelle
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 344 - 351
  • [28] A Policy Conflict Detection Scheme in Software Defined Networking
    Zhao, Chan-chan
    Liu, Feng
    Hai, Xiao-wei
    INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY (ICMEIT 2018), 2018, : 424 - 428
  • [29] Policy Authoring for Software-Defined Networking Management
    Machado, Cristian Cleder
    Wickboldt, Juliano Araujo
    Granville, Lisandro Zambenedetti
    Schaeffer-Filho, Alberto
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 216 - 224
  • [30] A Software-Defined Approach to IoT Networking
    Christian Jacquenet
    Mohamed Boucadair
    ZTE Communications, 2016, 14 (01) : 61 - 66