Modeling and verifying the topology discovery mechanism of OpenFlow controllers in software-defined networks using process algebra

被引:7
|
作者
Xiang, Shuangqing [1 ,3 ]
Zhu, Huibiao [1 ]
Wu, Xi [2 ]
Xiao, Lili [1 ]
Bonsangue, Marcello [3 ]
Xie, Wanling [4 ]
Zhang, Lei [5 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai, Peoples R China
[2] Univ Sydney, Sch Comp Sci, Sydney, NSW, Australia
[3] Leiden Univ, LIACS, Niels Bohrweg 1, NL-2333 CA Leiden, Netherlands
[4] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[5] East China Normal Univ, Shanghai Key Lab Multidimens Informat Proc, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Formal verification; Modeling; SDN; Secure topology discovery; TopoGuard; VERIFICATION;
D O I
10.1016/j.scico.2019.102343
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software-Defined Networking (SDN) is an emerging paradigm, providing separation of concerns between controllers that manage the network and switches that forward data flow. SDN enables network programmability and reduces the complexity of network control and management. The OpenFlow protocol is a widely accepted interface between SDN controllers and switches. OpenFlow controllers are the core of Software-Defined Networks (SDNs). They collect topology information to build a global and shared view of the network, which is used to provide services for topology-dependent core modules and applications. Therefore, the accuracy of the centralized abstract view of the network is of outermost importance for many essential SDN operations. However, the topology discovery mechanism used in almost all the mainstream OpenFlow controllers suffers from two kinds of topology poisoning attacks: Link Fabrication Attack and Host Hijacking Attack. TopoGuard is a wide-spread secure OpenFlow controller, which improves the standard topology discovery mechanism, providing automatic and real-time detection of these two attacks. However, the mechanism of TopoGuard lacks formal verification, especially in the situation where some hosts are migrating to their new locations. In this paper, we propose a general parameterized framework, including the Communicating Sequential Processes (CSP) models of the network components and the interfaces among them. Two loopholes of TopoGuard are found by implementing and verifying the proposed system model, which is an instance of the framework, in the model checker Process Analysis Toolkit (PAT). Moreover, we propose a new topology discovery mechanism based on TopoGuard, which solves the two loopholes. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [11] Modeling and Verifying Spark on YARN Using Process Algebra
    Yin, Jiaqi
    Zhu, Huibiao
    Fei, Yuan
    Fang, Yucheng
    201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019), 2019, : 208 - 215
  • [12] Modeling and Verifying the Ariadne Protocol Using Process Algebra
    Wu, Xi
    Zhu, Huibiao
    Zhao, Yongxin
    Wang, Zheng
    Liu, Si
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (01) : 393 - 421
  • [13] Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks
    Sharma, Gajanand
    Sharma, Himanshu
    Pareek, Rajneesh
    Gour, Nidhi
    Sharma, Ravi Shanker
    Kumar, Ashutosh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (08) : 2221 - 2232
  • [14] Modeling and Verifying OpenFlow Scheduled Bundle Mechanism using CSP
    Wang, Huiwen
    Zhu, Huibiao
    Xiao, Lili
    Xie, Wanling
    Lu, Gang
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 376 - 381
  • [15] Efficient Topology Discovery in Software Defined Networks: Revisited
    Hasan, Dana
    Othman, Mohamed
    DISCOVERY AND INNOVATION OF COMPUTER SCIENCE TECHNOLOGY IN ARTIFICIAL INTELLIGENCE ERA, 2017, 116 : 539 - 547
  • [16] Analysis of POX and Ryu Controllers Using Topology Based Hybrid Software Defined Networks
    Rohitaksha, K.
    Rajendra, A. B.
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 49 - 56
  • [17] Cyberattack defense mechanism using deep learning techniques in software-defined networks
    Rao, Dimmiti Srinivasa
    Emerson, Ajith Jubilson
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 1279 - 1291
  • [18] Cyberattack defense mechanism using deep learning techniques in software-defined networks
    Dimmiti Srinivasa Rao
    Ajith Jubilson Emerson
    International Journal of Information Security, 2024, 23 : 1279 - 1291
  • [19] Formal Modeling and Verifying Dubbo Using Process Algebra
    Hou, Zhiru
    Yin, Jiaqi
    Zhu, Huibiao
    Vinh, Phan Cong
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (4) : 1257 - 1272
  • [20] Proactive multipath routing with a predictive mechanism in software-defined networks
    Lin, Ying-Dar
    Liu, Te-Lung
    Wang, Shun-Hsien
    Lai, Yuan-Cheng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)