Optimizing Resource Allocation for Secure SDN-based Virtual Network Migration

被引:2
作者
Charmet, Fabien [1 ]
Blanc, Gregory [1 ]
Kiennert, Christophe [1 ]
机构
[1] Telecom SudParis, CNRS, Inst Polytech Paris, UMR 5157,Samovar, Evry, France
来源
2019 IEEE 18TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA) | 2019年
关键词
Markov Decision Process; Optimization; SDN; Virtual Network Migration; Security; Resource Allocation;
D O I
10.1109/nca.2019.8935027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent evolutions in cloud infrastructures allowed service providers to tailor new services for demanding customers. Providing these services confronts the infrastructure providers with costs and constraints considerations. In particular, security constraints are a major concern for today's businesses as the leak of personal information would tarnish their reputation. Recent works provide examples on how an attacker may leverage the infrastructure's weaknesses to steal sensitive information from the users. Specifically, an attacker can leverage maintenance processes inside the infrastructure to conduct an attack. In this paper, we consider the migration of a virtual network as the maintenance process. Then we determine the optimal monitoring resources allocation in this context with a Markov Decision Process. This model takes into account the impact of monitoring the infrastructure, the migration process and finally how the attacker may chose particular targets in the infrastructure. We provide a working prototype implemented in Python(1)
引用
收藏
页码:1 / 10
页数:10
相关论文
共 33 条
[21]  
Kodialam M, 2004, IEEE INFOCOM SER, P1808
[22]   Software-Defined Networking: A Comprehensive Survey [J].
Kreutz, Diego ;
Ramos, Fernando M. V. ;
Verissimo, Paulo Esteves ;
Rothenberg, Christian Esteve ;
Azodolmolky, Siamak ;
Uhlig, Steve .
PROCEEDINGS OF THE IEEE, 2015, 103 (01) :14-76
[23]   Wireless Resource Virtualization With Device-to-Device Communication Underlaying LTE Network [J].
Moubayed, Abdallah ;
Shami, Abdallah ;
Lutfiyya, Hanan .
IEEE TRANSACTIONS ON BROADCASTING, 2015, 61 (04) :734-740
[24]  
Nash J. M., 1977, Proceedings of the 1977 IEEE Conference on Decision and Control, P1177
[25]   Software Defined Networking Architecture, Security and Energy Efficiency: A Survey [J].
Rawat, Danda B. ;
Reddy, Swetha R. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01) :325-346
[26]  
Ristenpart T, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P199
[27]  
Scott-Hayward S., 2013, SDN4FNS 2013 2013 WO
[28]  
Sherwood R., 2009, OPENFLOW SWITCH CONS, V1, p, P132
[29]   ATTAIN: An Attack Injection Framework for Software-Defined Networking [J].
Ujcich, Benjamin E. ;
Thakore, Uttam ;
Sanders, William H. .
2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, :567-578
[30]  
Wang Y., 2015, FRAMEWORK SECURITY A