Adversarial topology discovery in network virtualization environments: a threat for ISPs?

被引:4
作者
Pignolet, Yvonne Anne [1 ]
Schmid, Stefan [2 ,3 ]
Tredan, Gilles [4 ]
机构
[1] ABB Corp Res, Dattwil, Switzerland
[2] Telekom Innovat Labs, Berlin, Germany
[3] TU Berlin, Berlin, Germany
[4] CNRS, LAAS, F-31077 Toulouse, France
关键词
Compendex;
D O I
10.1007/s00446-014-0217-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network virtualization is a new Internet paradigm which allows multiple virtual networks (VNets) to share the resources of a given physical infrastructure. The virtualization of entire networks is the natural next step after the virtualization of nodes and links. While the problem of how to embed a VNet ("guest network") on a given resource network ("host network") is algorithmically well-understood, much less is known about the security implications of this new technology. This paper introduces a new model to reason about one particular security threat: the leakage of information about the physical infrastructure-often a business secret. We initiate the study of this new problem and introduce the notion of request complexity which describes the number of VNet requests needed to fully disclose the substrate topology. We derive lower bounds and present algorithms achieving an asymptotically optimal request complexity for important graph classes such as trees, cactus graphs (complexity ) as well as arbitrary graphs (complexity ). Moreover, a general motif-based topology discovery framework is described which exploits the poset structure of the VNet embedding relation.
引用
收藏
页码:91 / 109
页数:19
相关论文
共 31 条
  • [1] Acharya HB, 2011, LECT NOTES COMPUT SC, V6522, P251, DOI 10.1007/978-3-642-17679-1_22
  • [2] Achlioptas Dimitris., 2005, Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, STOC '05, P694, DOI DOI 10.1145/1060590
  • [3] INAPPROXIMABILITY RESULTS FOR MAXIMUM EDGE BICLIQUE, MINIMUM LINEAR ARRANGEMENT, AND SPARSEST CUT
    Ambuehl, Christoph
    Mastrolilli, Monaldo
    Svensson, Ola
    [J]. SIAM JOURNAL ON COMPUTING, 2011, 40 (02) : 567 - 596
  • [4] Anandkumar A., 2011, P SIGMETRICS
  • [5] [Anonymous], P USENIX ANN TECHN C
  • [6] [Anonymous], P IEEE INFOCOM
  • [7] Bansal N, 2011, PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, P267
  • [8] Caucal D., 2008, LOGIC AUTOMATA HIST, V2, P169
  • [9] A survey of network virtualization
    Chowdhury, N. M. Mosharaf Kabir
    Boutaba, Raouf
    [J]. COMPUTER NETWORKS, 2010, 54 (05) : 862 - 876
  • [10] Substructure Discovery Using Minimum Description Length and Background Knowledge
    Cook, Diane J.
    Holder, Lawrence B.
    [J]. JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 1993, 1 : 231 - 255