Enforcing Optimal ACL Policies Using K-Partite Graph in Hybrid SDN

被引:19
作者
Amin, Rashid [1 ,2 ]
Shah, Nadir [1 ]
Mehmood, Wagar [1 ]
机构
[1] Comsats Univ Islamabad, Dept Comp Sci, Wah Campus, Wah Cantt 47040, Pakistan
[2] Univ Engn & Technol, Dept Comp Sci, Taxila 47050, Pakistan
关键词
Hybrid SDN; Policy Implementation; Graph Computation; Traffic Optimization; SOFTWARE-DEFINED NETWORKING; SECURITY; OPPORTUNITIES;
D O I
10.3390/electronics8060604
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Networking (SDN) as an innovative network paradigm that separates the management and control planes from the data plane of forwarding devices by implementing both the management and control planes at a logically centralized entity, called controller. Therefore, it ensures simple network management and control. However, due to several reasons (e.g., deployment cost, fear of downtime) organizations are very reluctant to adopt SDN in practice. Therefore, a viable solution is to replace the legacy devices by SDN devices incrementally. This results in a new network architecture called hybrid SDN. In hybrid SDN, both SDN and legacy devices operate in such a way to achieve the maximum benefit of SDN. The legacy devices are running a traditional protocol and SDN devices are operating using Open-flow protocols. Network policies play an essential role to secure the entire network from several types of attacks like unauthorized access and port/protocol control. In a hybrid SDN, policy implementation is a tedious task that requires extreme care and attention due to the hybrid nature of network traffic. Network policies may be implemented at various positions in hybrid SDN, e.g., near the destination or source node, and at the egress or ingress ports of a router. Each of these schemes has some trade-offs. For example, if policies are implemented near the source nodes then each packet generated from the source must pass through the filter and, thus, requires more processing power, time, resources, etc. Similarly, if policies are installed near the destination nodes, then a lot of unwanted traffic generated causing network congestion. This is an NP-hard problem. To address these challenges, we propose a systematic design approach to implement network policies optimally by using decision tree and K-partite graph. By traversing all the policies, we built up the decision tree that identifies which source nodes can communicate with which destination. Then, we traverse the decision tree and constructs K-partite graph to find possible places (interfaces of the routers) where ACL policies are to be implemented based on the different criteria (i.e., the minimum number of ACL rules and the minimum number of transmissions for unwanted traffic). The edge weight represents the cost per criteria. Then, we traverse the K-partite graph to find the optimal place for ACL rules implementation according to the given criteria. The simulation results indicate that the proposed technique outperforms existing approaches in terms of computation time, traffic optimization and successful packet delivery, etc. The results also indicate that the proposed method improves network performance and efficiency by decreasing network congestion and providing ease of policy implementation.
引用
收藏
页数:28
相关论文
共 41 条
[1]   Overview of 5G Security Challenges and Solutions [J].
Ahmad I. ;
Kumar T. ;
Liyanage M. ;
Okwuibe J. ;
Ylianttila M. ;
Gurtov A. .
IEEE Communications Standards Magazine, 2018, 2 (01) :36-43
[2]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[3]   Hybrid SDN Networks: A Survey of Existing Approaches [J].
Amin, Rashid ;
Reisslein, Martin ;
Shah, Nadir .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3259-3306
[4]   Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN [J].
Amin, Rashid ;
Shah, Nadir ;
Shah, Babar ;
Alfandi, Omar .
IEEE ACCESS, 2016, 4 :9437-9450
[5]  
Canini M., 2016, P ACM S SDN RES SANT
[6]   A Difference Resolution Approach to Compressing Access Control Lists [J].
Daly, James ;
Liu, Alex X. ;
Torng, Eric .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (01) :610-623
[7]   Software defined networking for security enhancement in wireless mobile networks [J].
Ding, Aaron Yi ;
Crowcroft, Jon ;
Tarkoma, Sasu ;
Flinck, Hannu .
COMPUTER NETWORKS, 2014, 66 :94-101
[8]  
Fayazbakhsh S. K., 2014, P 11 USENIX S NETW S, V14, P533
[9]  
Fayazbakhsh SeyedKaveh., 2013, Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN '13, P19, DOI 10.1145/2491185.2491203
[10]   DDoS Attack Monitoring using Smart Controller Placement in Software Defined Networking Architecture [J].
Haque, Muhammad Reazul ;
Tan, Saw C. ;
Yusoff, Zulfadzli ;
Lee, Ching K. ;
Kaspin, Rizaludin .
COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 :195-203