首页> 外文期刊>Computer networks >Towards trusted and efficient SDN topology discovery: A lightweight topology verification scheme
【24h】

Towards trusted and efficient SDN topology discovery: A lightweight topology verification scheme

机译:迈向可信高效的SDN拓扑发现:轻量级拓扑验证方案

获取原文
获取原文并翻译 | 示例

摘要

Discovering network topology is critical for Software-defined Networking (SDN) controllers to establish the centralized network visibility. However, during the process of SDN topology discovery, SDN controllers tend to suffer from the topology poisoning attacks due to a lack of authentication. Existing methods can hardly solve the problems of SDN topology poisoning attacks in a comprehensive and lightweight manner. To fill this gap, we propose TrustTopo, a lightweight and efficient SDN topology verification scheme. Specifically, we first establish a security threat model to analyze key service vulnerabilities in the SDN controller. Then, we design two verification strategies (i.e., host location verification and link verification) to cope with the host hijacking attack and link fabrication attack, respectively. In more detail, our host location verification strategy is based on the path tracking and asynchronous rollback technique, while our link verification strategy is designed using the chaotic model and dynamic password generation technique. We implement TrustTopo in the mainstream SDN controller (i.e., Floodlight). Experimental results in the Mininet virtual network environment show that TrustTopo can effectively secure the network topology against the representative topology poisoning attacks, while bringing negligible runtime overhead. (C) 2020 Elsevier B.V. All rights reserved.
机译:发现网络拓扑对于软件定义网络(SDN)控制器建立集中式网络可见性至关重要。但是,在SDN拓扑发现过程中,由于缺少身份验证,SDN控制器容易遭受拓扑中毒攻击。现有方法难以全面,轻便地解决SDN拓扑中毒攻击问题。为了填补这一空白,我们提出了TrustTopo,这是一种轻量级且高效的SDN拓扑验证方案。具体来说,我们首先建立一个安全威胁模型,以分析SDN控制器中的关键服务漏洞。然后,我们设计了两种验证策略(即主机位置验证和链接验证)以分别应对主机劫持攻击和链接制造攻击。更详细地说,我们的主机位置验证策略基于路径跟踪和异步回滚技术,而我们的链接验证策略是使用混沌模型和动态密码生成技术设计的。我们在主流SDN控制器(即Floodlight)中实现TrustTopo。在Mininet虚拟网络环境中的实验结果表明,TrustTopo可以有效地保护网络拓扑免受典型的拓扑中毒攻击,同时带来可忽略的运行时开销。 (C)2020 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号