On the Design and Implementation of a Security Architecture for Software Defined Networks

被引:0
|
作者
Karmakar, Kallol Krishna [1 ]
Varadharajan, Vijay [1 ]
Tupakula, Udaya [1 ]
机构
[1] Macquarie Univ, Fac Sci, Adv Cyber Secur Res Ctr, Sydney, NSW, Australia
关键词
Software Defined Networking (SDN) Security; OpenFlow; ACL; Source Spoofing; Policy Control;
D O I
10.1109/HPCC-SmartCity-DSS.2016.138
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose techniques for securing Software Defined Networks(SDN). We describe the design of a security architecture that makes use of security applications on top of the SDN Controller to specify fine granular security policies based on domain wide knowledge of the domain and Security Agents to enforce these policies in the switches in the data plane. We have extended the Open Flow protocol to enable communication of the security policies between the security applications in the Controller to the agents in the switches. We have implemented the security architecture using POX Controller and demonstrated the operation of our architecture in a range of scenarios such as enforcing specific security policies for different traffic with different services, counteracting attacks such as Heartbleed and Shellshock as well as spoofing attacks, and protecting Content Management Systems(CMS) from data confidentiality attacks.
引用
收藏
页码:671 / 678
页数:8
相关论文
共 50 条
  • [21] Design and implementation of a hardware assisted security architecture for software integrity monitoring
    Morgan, Benoit
    Alata, Eric
    Nicomette, Vincent
    Kaaniche, Mohamed
    Averlant, Guillaume
    2015 IEEE 21ST PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2015, : 189 - 198
  • [22] Design and Implementation of Cloud Security Defense System with Software Defined Networking Technologies
    Lai, Sin-Fu
    Su, Hui-Kai
    Hsiao, Wen-Hsu
    Chen, Kim-Joan
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 292 - 297
  • [23] Design and Implementation of Device-to-Device Software-Defined Networks
    Zhou, Mingxin
    Zhang, Huanyu
    Zhang, Shengli
    Song, Lingyang
    Li, Yonghui
    Han, Zhu
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [24] The (In)Security of Topology Discovery in Software Defined Networks
    Alharbi, Talal
    Portmann, Marius
    Pakzad, Farzaneh
    40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 502 - 505
  • [25] Enhancing Security of Software Defined Mobile Networks
    Liyanage, Madhusanka
    Ahmed, Ijaz
    Okwuibe, Jude
    Ylianttila, Mika
    Kabir, Hammad
    Santos, Jesus Llorente
    Kantola, Raimo
    Lopez Perez, Oscar
    Uriarte Itzazelaia, Mikel
    De Oca, Edgardo Monies
    IEEE ACCESS, 2017, 5 : 9422 - 9438
  • [26] Towards security automation in Software Defined Networks
    Yungaicela-Naula, Noe M.
    Vargas-Rosales, Cesar
    Arturo Perez-Diaz, Jesus
    Zareei, Mahdi
    COMPUTER COMMUNICATIONS, 2022, 183 : 64 - 82
  • [27] Software-Defined Mobile Networks Security
    Chen, Min
    Qian, Yongfeng
    Mao, Shiwen
    Tang, Wan
    Yang, Ximin
    MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05): : 729 - 743
  • [28] Security for Future Software Defined Mobile Networks
    Liyanage, Madhusanka
    Ahmad, Ijaz
    Ylianttila, Mika
    Santos, Jesus Llorente
    Kantola, Raimo
    Lopez Perez, Oscar
    Uriarte Itzazelaia, Mikel
    de Oca, Edgardo Montes
    Valtierra, Asier
    Jimenez, Carlos
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 256 - 264
  • [29] A Security Services Platform for Software Defined Networks
    Tatlicioglu, Sinan
    Civanlar, Seyhan
    Gorkemli, Burak
    Lokman, Erhan
    Balci, A. Metin
    Eliacik, C. Bora
    2016 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2016, : 39 - 43
  • [30] Security Threats and Countermeasures in Software Defined Networks
    Ahmed, Adnan
    Manzoor, Adnan
    Halepoto, Imtiaz Ali
    Abbas, Fizza
    Rajput, Ubaidullah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (04): : 69 - 74