Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks

被引:18
作者
Bringhenti, Daniele [1 ]
Yusupov, Jalolliddin [2 ]
Zarca, Alejandro Molina [3 ]
Valenza, Fulvio [1 ]
Sisto, Riccardo [1 ]
Bernabe, Jorge Bernal [3 ]
Skarmeta, Antonio [3 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, Turin, Italy
[2] Turin Polytech Univ, Dept Automat Control & Comp Engn, Tashkent, Uzbekistan
[3] Univ Murcia, Dept Commun & Informat Engn, Murcia, Spain
关键词
Security; IoT; SDN; INTERNET;
D O I
10.1016/j.comnet.2022.109123
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The pervasiveness of Internet of Things (IoT) has made the management of computer networks more troublesome. The softwarized control provided by Software-Defined Networking (SDN) is not sufficient to overcome the problems raising in this context. An increasing number of attacks can, in fact, occur in SDN-aware IoT networks if the security configuration enforced on the SDN switches is manually computed and not formally verified. To mitigate this problem, this paper proposes a novel methodology which leverages Maximum Satisfiability Modulo Theories (MaxSMT) to automatically compute a formally correct and optimized allocation scheme and configuration of SDN switches by refining security policies, user-defined or derived from detected attacks. This mechanism is compliant with the main characteristics of virtualized IoT-based networks, such as the simultaneous presence of numerous interconnected devices and strict latency requirements. The feasibility and the performance of the framework developed to implement this methodology have been validated in a realistic use case.
引用
收藏
页数:12
相关论文
共 48 条
[1]   Automatic security policy enforcement in computer systems [J].
Adi, Kamel ;
Hamza, Lamia ;
Pene, Liviu .
COMPUTERS & SECURITY, 2018, 73 :156-171
[2]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[3]  
[Anonymous], 2013, 2013 IEEE SDN FUTURE
[4]  
[Anonymous], 2013, 20 ANN NETW DISTR SY
[5]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[6]   Firmato:: A novel firewall management toolkit [J].
Bartal, Y ;
Mayer, A ;
Nissim, K ;
Wool, A .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2004, 22 (04) :381-420
[7]   Adding Support for Automatic Enforcement of Security Policies in NFV Networks [J].
Basile, Cataldo ;
Valenza, Fulvio ;
Lioy, Antonio ;
Lopez, Diego R. ;
Pastor Perales, Antonio .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (02) :707-720
[8]   A survey on service function chaining [J].
Bhamare, Deval ;
Jain, Raj ;
Samaka, Mohammed ;
Erbad, Aiman .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 :138-155
[9]  
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[10]   Automated optimal firewall orchestration and configuration in virtualized networks [J].
Bringhenti, Daniele ;
Marchetto, Guido ;
Sisto, Riccardo ;
Valenza, Fulvio ;
Yusupov, Jalolliddin .
NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,