A Dynamic Service Identity-Based Security Policy Consistency Checking Mechanism in SDN

被引:0
作者
Yan, Xincheng [1 ]
Wu, Jianhua [1 ]
Zhou, Na [1 ]
Jiang, Zhihong [1 ]
Zeng, Junsan [2 ]
Yin, Jianhui [2 ,3 ]
Liu, Ying [2 ]
机构
[1] State Key Lab Mobile Network & Mobile Multimedia, Shenzhen, Peoples R China
[2] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[3] Peng Cheng Lab, Dept New Networks, Shenzhen, Guangdong, Peoples R China
来源
2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS | 2024年
关键词
Software-Defined Networking (SDN); Network Functions Virtualization (NFV); Service Function Chaining (SFC); Policy consistency checking; P4; Path verification; NETWORKS;
D O I
10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00034
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Service Function Chaining (SFC) is the basic business model in a Virtualization of Network Functions (VNF) scenario, which enables the provision of customized network services, including security services such as resiliently deployed stateless firewalls, load balancers, and Intrusion Detection and Prevention Systems (IDPS). However, conflicting security policies during service matching and operation enforcement may lead to problems such as policy inconsistency, forwarding loop, and information leakage. To solve these problems, the paper takes a global view of the SDN controller and configures unique service identifiers and authentication keys for policy enforcers. At the same time, a probabilistic path authentication identifier is inserted for the packet using programming protocol-independent packet processors (P4) language and combined with a symmetric key-based authentication algorithm to realize the policy checking mechanism. In this way, the consistency of the SDN controller security policy can be ensured in terms of both the consistency of the SDN flow table rules and the consistency of the enforced policies in the service function chain. The experimental results show that our mechanism can effectively ensure the consistency of security policies under the premise of ensuring acceptable throughput and delay overhead.
引用
收藏
页码:59 / 64
页数:6
相关论文
共 3 条
  • [1] A Dynamic Composition Mechanism of Security Service Chaining Oriented to SDN/NFV-Enabled Networks
    Liu, Yicen
    Lu, Yu
    Qiao, Wenxin
    Chen, Xingkai
    IEEE ACCESS, 2018, 6 : 53918 - 53929
  • [2] Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments
    Chowdhary, Ankur
    Pisharody, Sandeep
    Alshamrani, Adel
    Huang, Dijiang
    SDN-NFVSEC'17: PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION, 2017, : 53 - 58
  • [3] Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model
    Patonico, Simone
    Braeken, An
    Steenhaut, Kris
    WIRELESS NETWORKS, 2023, 29 (03) : 1017 - 1029