| Literature DB >> 28430155 |
Zhaowen Lin1,2,3, Dan Tao4,5, Zhenji Wang6.
Abstract
For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.Entities:
Keywords: RETE; security service; service composition; software defined network
Year: 2017 PMID: 28430155 PMCID: PMC5426916 DOI: 10.3390/s17040920
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Security protection architecture for SDN.
Figure 2Architecture of the security service orchestration center.
Four types of security meta-functions included.
| Type | Name | Description |
|---|---|---|
| Firewall | ACL_FUNCTION | ACL access control |
| DOS_FUNCTION | Anti-DOS attack | |
| WBLIST_FUNCTION | White-black list control | |
| CON_FUNCTION | Policy configuration | |
| Intrusion detection | NETDEC_FUNCTION | Network detection |
| LOG_FUNCTION | Security log | |
| RULE_FUNCTION | Rule configuration | |
| WAR_FUNCTION | Real-time warning | |
| KVM | KVMCRE_FUNCTION | KVM creation |
| NETCON_FUNCTION | Network configuration | |
| KVMDEL_FUNCTION | KVM deletion | |
| Flow scheduling | PATHDES_FUNCTION | Path assignment |
| PATHLIM_FUNCTION | Limited path |
Some parameters used in the process of forward reasoning.
| Parameter | Meaning |
|---|---|
| state | |
| condition | |
| rule | |
| rely relationship | |
| priority |
Figure 3State transition diagram I.
Figure 4State transition diagram II.
Figure 5State transition diagram III.
Figure 6State transition diagram.
Figure 7Optimized security rule composition network.
Figure 8Network topology.
The configuration requirements of VMs in the network topology.
| Parameter | Configuration |
|---|---|
| OS | Ubuntu 14.04 |
| OS Type | 64 bit |
| CPU Type | Intel Core i5-3210M CPU@2.5GHz*4 |
| Memory | 1.9 G |
| Disk | 31.3 GB |
Figure 9Configuration result of Firewall.
Figure 10Flow charts of (a) OVS3; (b) OVS4; (c) OVS5 and (d) OVS6.
Figure 11The rule-combining time comparison with and without using optimization algorithm for single user.
Figure 12The rule-combining time comparison with and without using optimization algorithm for multiple users.
Figure 13Comparison between two algorithms.