AuthFlow: authentication and access control mechanism for software defined networking

被引:49
作者
Ferrazani Mattos, Diogo Menezes [1 ,2 ]
Muniz Bandeira Duarte, Otto Carlos [1 ]
机构
[1] Univ Fed Rio de Janeiro COPPE UFRJ, Grp Teleinformat & Automacao, Rio De Janeiro, RJ, Brazil
[2] UPMC Univ Paris 06, Sorbonne Univ, Lab Informat Paris 6, Paris, France
关键词
Access control; Authentication; Software-defined networking; OPENFLOW;
D O I
10.1007/s12243-016-0505-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Software-defined networking (SDN) is being widely adopted by enterprise networks, whereas providing security features in these next generation networks is a challenge. In this article, we present the main security threats in software-defined networking and we propose AuthFlow, an authentication and access control mechanism based on host credentials. The main contributions of our proposal are threefold: (i) a host authentication mechanism just above the MAC layer in an OpenFlow network, which guarantees a low overhead and ensures a fine-grained access control; (ii) a credential-based authentication to perform an access control according to the privilege level of each host, through mapping the host credentials to the set of flows that belongs to the host; (iii) a new framework for control applications, enabling software-defined network controllers to use the host identity as a new flow field to define forwarding rules. A prototype of the proposed mechanism was implemented on top of POX controller. The results show that AuthFlow denies the access of hosts either without valid credentials or with revoked authorization. Finally, we show that our scheme allows, for each host, different levels of access to network resources according to its credential.
引用
收藏
页码:607 / 615
页数:9
相关论文
共 23 条
[1]  
[Anonymous], 2013, P 2 ACM SIGCOMM WORK, DOI DOI 10.1145/2491185.2491199
[2]  
[Anonymous], 2013, 20 ANN NETWORK DISTR
[3]  
[Anonymous], 2015, GLOBAL INFORM INFRAS
[4]  
Canini Marco, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P190, DOI 10.1109/INFOCOM.2015.7218382
[5]  
Cardini Laura Ana, 2015, Pap. trab. - Cent. Estud. Interdiscip. Etnolingüíst. Antropol. Soc., P1
[6]   Ethane: Taking control of the enterprise [J].
Casado, Martin ;
Freedman, Michael J. ;
Pettit, Justin ;
Luo, Jianying ;
McKeown, Nick ;
Shenker, Scott .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) :1-12
[7]   Virtual networks: isolation, performance, and trends [J].
Fernandes, Natalia C. ;
Moreira, Marcelo D. D. ;
Moraes, Igor M. ;
Ferraz, Lyno Henrique G. ;
Couto, Rodrigo S. ;
Carvalho, Hugo E. T. ;
Campista, Miguel Elias M. ;
Costa, Luis Henrique M. K. ;
Duarte, Otto Carlos M. B. .
ANNALS OF TELECOMMUNICATIONS, 2011, 66 (5-6) :339-355
[8]   On the testing of network cyber threat detection methods on spam example [J].
Filasiak, Robert ;
Grzenda, Maciej ;
Luckner, Marcin ;
Zawistowski, Pawel .
ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) :363-377
[9]  
Ferraz LHG, 2014, IEEE GLOB COMM CONF, P2270, DOI 10.1109/GLOCOM.2014.7037146
[10]  
Guenane F, 2012, GLOB INF INFR NETW S, P1