SECURITY ANALYSIS OF MULTIPLE SDN CONTROLLERS BASED ON STOCHASTIC PETRI NETS

被引:1
|
作者
Almutairi, Laila [1 ]
Hong, Liang [1 ]
Shetty, Sachin [2 ]
机构
[1] Tennessee State Univ, Elect & Comp Engn Dept, Nashville, TN 37203 USA
[2] Old Dominion Univ, Ctr Cybersecur Educ & Res, Norfolk, VA USA
来源
2019 SPRING SIMULATION CONFERENCE (SPRINGSIM) | 2019年
关键词
Software-defined networking (SDN); Multiple controllers; Security analysis; Stochastic Petri Net (SPN); SOFTWARE-DEFINED NETWORKING;
D O I
10.23919/springsim.2019.8732908
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Distributed control plane architecture in SDN solves the problem of single point of failure. However, it does not protect the network from security attacks. Therefore, we investigate SDN with multiple controllers' attacks using Stochastic Petri Net. We identify attacker actions and model the attacker scenarios against the control plane. We analyze the developed SPN attack graph and study the uncertainty of the attacker such as the number of attackers in the network and attacker rates.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] SDN-based Security Mechanism
    Aneci, Mihai-Nicolae
    Gheorghe, Laura
    Carabas, Mihai
    Soriga, Stefan
    Somcsan, Raluca-Andrcca
    2015 14TH ROEDUNET INTERNATIONAL CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET NER), 2015, : 12 - 17
  • [22] A modified method for analyzing authentication protocol security using Colored Petri Nets
    Shen, Jiajun
    Feng, Dongqin
    Chu, Jian
    Feng, D. (dqfeng@iipc.zju.edu.cn), 1600, Binary Information Press (10): : 4233 - 4243
  • [23] Generalized Stochastic Petri Net Model Based Security Risk Assessment of Software Defined Networks
    Almutairi, Laila M.
    Shetty, Sachin
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 545 - 550
  • [24] A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers
    Han, Tao
    Jan, Syed Rooh Ullah
    Tan, Zhiyuan
    Usman, Muhammad
    Jan, Mian Ahmad
    Khan, Rahim
    Xu, Yongzhao
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (16)
  • [25] Modeling and Analysis of Information Theft Trojan Based on Stochastic Game Nets
    Yu, Min
    Liu, Chao
    Qiu, Xinliang
    Zhao, Shuang
    Liu, Kunying
    Hu, Bo
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 318 - 322
  • [26] Performance Analysis of SDN/OpenFlow Controllers: POX Versus Floodlight
    Bholebawa, Idris Z.
    Dalal, Upena D.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (02) : 1679 - 1699
  • [27] Prioritized admission control with load distribution over multiple controllers for scalable SDN-based mobile networks
    Yeunwoong Kyung
    Jinwoo Park
    Wireless Networks, 2019, 25 : 2963 - 2976
  • [28] Prioritized admission control with load distribution over multiple controllers for scalable SDN-based mobile networks
    Kyung, Yeunwoong
    Park, Jinwoo
    WIRELESS NETWORKS, 2019, 25 (06) : 2963 - 2976
  • [29] SMCLBRT: A Novel Load-balancing Strategy of Multiple SDN Controllers Based on Response Time<bold> </bold>
    Cui, Jie
    Lu, Qinghe
    Zhong, Hong
    Tian, Miaomiao
    Liu, Lu
    IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018, : 541 - 546
  • [30] Analysis of two authorization protocols using Colored Petri Nets
    Younes Seifi
    Suriadi Suriadi
    Ernest Foo
    Colin Boyd
    International Journal of Information Security, 2015, 14 : 221 - 247