A model transformation based security policy automatic management framework for software-defined networking

被引:0
作者
Meng, Yunfei [1 ]
Ke, Changbo [2 ]
Huang, Zhiqiu [3 ]
机构
[1] Qingdao Binhai Univ, Coll Informat Engn, Qingdao 266555, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Comp Sci & Technol, Nanjing 210023, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
基金
中国国家自然科学基金;
关键词
SDN; Formal method; Security policy; Model transformation; Runtime monitoring;
D O I
10.1016/j.cose.2024.103850
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networking (SDN) has been utilized to enforce the security of traditional networks. However, the existing SDN-based security enforcement mechanisms rely heavily on the security policies containing the underlying information of data plane, such as MAC address, IP address or switch ports. These security policies need to be specifically developed by network operators and loaded into the control plane manually. With increasing the scale of underlying network, the existing security policy management mechanisms confront more and more challenges. The security policy transformation for SDN networks is to research how to transform the high-level security policy without containing the underlying information into the practical flow entries used by Openflow switches automatically, thereby implementing the automatic management of security policies. To achieve this objective, we propose a model transformation based security policy automatic management framework for software-defined networking in this paper. Leveraging its functional modules, the framework can solve the problems of how to find a connected path for each access control rule of security policy model (SPM) in data plane, how to transform the connected path into the system model of flow entries, as well as how to generate the practical flow entries according to the system model of flow entries. In order to validate the effectiveness and performance of framework, we implement the framework by leveraging POX controller and Mininet emulator. The experimental results illustrate the framework can transform SPM into practical flow entries, synchronously perceive the modifications caused by cutting down one connected path or changing SPM, and continuously keep the data plane holding the security properties defined by SPM at runtime.
引用
收藏
页数:11
相关论文
共 41 条
  • [1] Abadi M., 1991, INT CRYPT C
  • [2] Firewall policy advisor for anomaly discovery and rule editing
    Al-Shaer, ES
    Hamed, HH
    [J]. INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 17 - 30
  • [3] Anderson R.N. Anne, 2003, Enterprise Privacy Authorization Language
  • [4] [Anonymous], 2017, POX
  • [5] [Anonymous], 2012, MININET
  • [6] Finite state transducers for policy evaluation and conflict resolution
    Baliosian, J
    Serrat, J
    [J]. FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 250 - 259
  • [7] Bandara AK, 2003, IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, P26
  • [8] Securing middlebox policy enforcement in SDN
    Bu, Kai
    Yang, Yutian
    Guo, Zixuan
    Yang, Yuanyuan
    Li, Xing
    Zhang, Shigeng
    [J]. COMPUTER NETWORKS, 2021, 193
  • [9] Clarke E.M ..., 1997, Model checking
  • [10] Commitee T.O.T., 2005, Xacml: Extensible Access Control Markup Language