SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks

被引:18
作者
Abdulqadder, Ihsan H. [1 ]
Zou, Deqing [1 ,2 ]
Aziz, Israa T. [1 ,3 ]
Yuan, Bin [1 ]
Li, Weiming [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
[2] Shenzhen Huazhong Univ Sci & Technol, Res Inst, Shenzhen 518057, Peoples R China
[3] Univ Mosul, Mosul 41002, Iraq
基金
美国国家科学基金会;
关键词
Attackers; cloud computing; routing; security; softwaredefined network;
D O I
10.1109/ACCESS.2018.2797214
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A software-defined network (SDN) is a technology that supports computer network administrators. However, the centralized control plane architecture of SDNs makes them vulnerable to harmful security threats. In this paper, we propose a secure cloud (SecSDN-cloud) architecture that includes user authentication, routing, attack resistance, and third-party monitoring. The goal of this paper is to design an SDN-cloud environment with integrated security that can resist three different attack types: flow table overloading, control plane saturation, and Byzantine attacks. A novel digital signature with chaotic secure hashing is used for user authentication, followed by an enhanced particle swarm optimization multi-class routing protocol to improve the quality of service. Controllers are assigned to switches by integrating an enhanced genetic algorithm with a modified cuckoo search algorithm. The malicious flow identification includes the analysis of five-tuples constructed from features extracted from packets. We implemented the proposed SecSDN-cloud in the OMNeT++ simulator and evaluated its performance in terms of packet loss, end-to-end delay, throughput, latency, and bandwidth.
引用
收藏
页码:8292 / 8301
页数:10
相关论文
共 35 条
[1]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[2]  
Al-Zewairi M, 2017, 2017 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), P32, DOI 10.1109/SDS.2017.7939137
[3]  
Alishahi M, 2016, P PEER TO PEER NETW, V11, P1
[4]   Model-Based Testing of SDN Firewalls: A Case Study [J].
Alsmadi, Izzat ;
Munakami, Milson ;
Xu, Dianxiang .
2015 SECOND INTERNATIONAL CONFERENCE ON TRUSTWORTHY SYSTEMS AND THEIR APPLICATIONS, 2015, :73-80
[5]   LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking [J].
Ambrosin, Moreno ;
Conti, Mauro ;
De Gaspari, Fabio ;
Poovendran, Radha .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (02) :1206-1219
[6]  
[Anonymous], 2017, IEEE INFOCOM 2017-IEEE Conference on Computer Communications
[7]  
Banse C., 2017, P IEEE INT C COMM IC, P1
[8]   Detecting Byzantine Attacks Without Clean Reference [J].
Cao, Ruohan ;
Wong, Tan F. ;
Lv, Tiejun ;
Gao, Hui ;
Yang, Shaoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2717-2731
[9]   HBD: Towards Efficient Reactive Rule Dispatching in Software-Defined Networks [J].
Chen, Chang ;
Hu, Xiaohe ;
Zheng, Kai ;
Wang, Xiang ;
Xiang, Yang ;
Li, Jun .
TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (02) :196-209
[10]   AuthFlow: authentication and access control mechanism for software defined networking [J].
Ferrazani Mattos, Diogo Menezes ;
Muniz Bandeira Duarte, Otto Carlos .
ANNALS OF TELECOMMUNICATIONS, 2016, 71 (11-12) :607-615