A security policy model transformation and verification approach for software defined networking

被引:2
|
作者
Meng, Yunfei [1 ]
Huang, Zhiqiu [1 ]
Shen, Guohua [1 ]
Ke, Changbo [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
SDN; Security policy model; Model transformation; Security policy verification; Model checking;
D O I
10.1016/j.cose.2020.102089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networking (SDN) has been increasingly utilized to enforce the security of complex networks. However SDN-based security enforcement mechanisms rely heavily on some specific security policies containing underlying network information. Facing the increasingly complex and huge SDN networks, we urgently need a novel security policy management mechanism which can be completely transparent to any underlying network information. That is it can permit network managers to define the high-level security policy model without containing any underlying information, and by means of model transformation, high-level security policy model can be automatically transformed into its corresponding lower-level security policy model containing underlying information. Moreover, we must ensure the system model of data plane updated by the low-level security policy model can hold all of security properties defined in high-level security policy model. Based on these insights, we propose a security policy model transformation and verification approach for SDN in this paper. We first specify the security policies used in SDN networks as a formal security policy model (SPM). Then we establish the system model of SDN's data plane and the mapping rules between the policy objects of SPM and the system objects of system model of data plane. Based on these mapping rules, we propose a security policy model transformation mechanism which transforms SPM into the low-level security policy model, RSPM. In order to verify the system model of data plane updated by RSPM can hold all of security properties defined in SPM, we propose a security policy verification mechanism based on model checking techniques and a group of validation conditions. Finally, we utilize a comprehensive case to illustrate the feasibility of this approach. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A Software-Defined Networking approach for congestion control in Opportunistic Networking
    de Toro, Ma Carmen
    Borrego, Carlos
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 354 - 359
  • [42] SRV: Switch-based Rules Verification in Software Defined Networking
    Tseng, Yuchia
    Zhang, Zonghua
    Nalt-Abdesselam, Farid
    2016 IEEE NETSOFT CONFERENCE AND WORKSHOPS (NETSOFT), 2016, : 477 - 482
  • [43] Software Defined Networking
    Eissa, Hend Abdelgader
    Bozed, Kenz A.
    Younis, Hadil
    2019 19TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL AND COMPUTER ENGINEERING (STA), 2019, : 620 - 625
  • [44] SOFTWARE DEFINED NETWORKING
    Yang, Richard
    Bi, Jun
    Gu, Guofei
    CHINA COMMUNICATIONS, 2014, 11 (02) : I - II
  • [45] AC-PROT: An Access Control Model to Improve Software-Defined Networking Security
    Wu, Wei
    Liu, Renping
    Ni, Wei
    Kaafar, Dali
    Huang, Xiaojing
    2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [46] Approach of Performance Analysis for Controllers of Software Defined Networking
    Soto-Cordova, Martin M.
    Chavez-Hidalgo, Gabriela
    Niquen-Ortega, Roel
    2019 CONGRESO INTERNACIONAL DE INNOVACION Y TENDENCIAS EN INGENIERIA (CONIITI ), 2019,
  • [47] Resilience in the Internet of Things: The Software Defined Networking Approach
    Sandor, Hunor
    Genge, Bela
    Sebestyen-Pal, Gheorghe
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2015, : 545 - 552
  • [48] Software defined networking to support the software defined environment
    Dixon, C.
    Olshefski, D.
    Jain, V.
    DeCusatis, C.
    Felter, W.
    Carter, J.
    Banikazemi, M.
    Mann, V.
    Tracey, J. M.
    Recio, R.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2014, 58 (2-3)
  • [49] Blessing or Curse? Revisiting Security Aspects of Software-Defined Networking
    Schehlmann, Lisa
    Abt, Sebastian
    Baier, Harald
    2014 10TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2014, : 382 - 387
  • [50] Software-Defined Networking: A New Approach to Fifth Generation Networks - Security Issues and Challenges Ahead
    Daneshmand, Behrooz
    Le, Tu Anh
    2022 THIRTEENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2022, : 307 - 313