A Defense Mechanism of Random Routing Mutation in SDN

被引:19
作者
Liu, Jiang [1 ]
Zhang, Hongqi [1 ]
Guo, Zhencheng [2 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
[2] Northwestern Univ, Xian 710075, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
random routing mutation; moving target defense; OpenFlow protocol; software-defined network;
D O I
10.1587/transinf.2016EDP7377
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Focused on network reconnaissance, eavesdropping, and DoS attacks caused by static routing policies, this paper designs a random routing mutation architecture based on the OpenFlow protocol, which takes advantages of the global network view and centralized control in a software-defined network. An entropy matrix of network traffic characteristics is constructed by using volume measurements and characteristic measurements of network traffic. Random routing mutation is triggered according to the result of network anomaly detection, which using a wavelet transform and principal component analysis to handle the above entropy matrix for both spatial and temporal correlations. The generation of a random routing path is specified as a 0-1 knapsack problem, which is calculated using an improved ant colony algorithm. Theoretical analysis and simulation results show that the proposed method not only increases the difficulty of network reconnaissance and eavesdropping but also reduces the impact of DoS attacks on the normal communication in an SDN network.
引用
收藏
页码:1046 / 1054
页数:9
相关论文
共 19 条
[1]  
Al-Shaer E, 2011, ADV INFORM SECUR, V54, P153
[2]  
[Anonymous], 2014, Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks WoWMoM, DOI DOI 10.1109/WOWMOM.2014.6918979
[3]  
Atighetchi M, 2003, ISORC 2003: SIXTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, P183
[4]  
Badishi G, 2007, IEEE T DEPEND SECURE, V4, P191, DOI [10.1109/TDSC.2007.70209, 10.1109/TDSC.2007.70209.]
[5]  
Duan Q, 2013, IEEE CONF COMM NETW, P260, DOI 10.1109/CNS.2013.6682715
[6]  
Dunlop M, 2011, 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, P1321, DOI 10.1109/MILCOM.2011.6127486
[7]  
Gillani Fida, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P729, DOI 10.1109/INFOCOM.2015.7218442
[8]  
Jafarian Jafar Haadi, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P738, DOI 10.1109/INFOCOM.2015.7218443
[9]  
Jafarian Jafar Haadi, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P237, DOI 10.1007/978-3-642-40203-6_14
[10]   An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks [J].
Jafarian, Jafar Haadi ;
Al-Shaer, Ehab ;
Duan, Qi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) :2562-2577