IS2N: Intent-Driven Security Software-Defined Network With Blockchain

被引:3
|
作者
Song, Yanbo [1 ]
Feng, Tao [2 ]
Yang, Chungang [1 ]
Mi, Xinru [1 ]
Jiang, Shanqing [3 ]
Guizani, Mohsen [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Acad Mil Sci PLA, Inst Syst Engn, Beijing 100039, Peoples R China
[3] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[4] Mohamed Bin Zayed Univ Artificial Intelligence MBZ, Machine Learning Dept, Abu Dhabi, U Arab Emirates
来源
IEEE NETWORK | 2024年 / 38卷 / 03期
关键词
Blockchains; Security; Monitoring; Network security; Middleware; Control systems; Security management; Software defined networking; Internet;
D O I
10.1109/MNET.138.2200539
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined network (SDN) is characterized by its programmability, flexibility, and the separation of control and data planes. However, SDN still have many challenges, particularly concerning the security of network information synchronization and network element registration. Blockchain and intent-driven networks are recent technologies to establish secure and intelligent SDN. This article investigates the blockchain-based architecture and intent-driven mechanisms to implement intent-driven security software-defined networks (IS2N). Specifically, we propose a novel four-layer architecture of the IS2N with security capabilities. We integrate an intent-driven security management mechanism in the IS2N to achieve automate network security management. Finally, we develop an IS2N platform with blockchain middle-layer to achieve security capabilities and security store network-level snapshots, such as device registration and OpenFlow messages. Our simulations show that IS2N is more flexible than conventional strategies at resolving problems during network operations and has a minimal effect on the SDN.
引用
收藏
页码:118 / 127
页数:10
相关论文
共 50 条
  • [21] A Security-aware Software-defined IoT Network Architecture
    Zuo, Xinbin
    Pang, Xue
    Zhang, Pengping
    Zhang, Junsan
    Dong, Tao
    Zhang, Peiying
    [J]. 2020 IEEE COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2021,
  • [22] Performance and Security Oriented Software-Defined Network Interface Design
    Huang, Ken-Shin
    Chao, Hung-Lin
    Wu, Tsung-Tien
    Hsiung, Pao-Ann
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2017,
  • [23] A novel Security Mechanism for Software Defined Network Based on Blockchain
    Guo, Xian
    Wang, Chen
    Cao, Laicheng
    Jiang, Yongbo
    Yan, Yan
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2022, 19 (02) : 523 - 545
  • [24] Risk-Driven Security Metrics Development for Software-Defined Networking
    Savola, Reijo M.
    Savolainen, Pekka
    [J]. ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
  • [25] Software-Defined Mobile Networks Security
    Min Chen
    Yongfeng Qian
    Shiwen Mao
    Wan Tang
    Ximin Yang
    [J]. Mobile Networks and Applications, 2016, 21 : 729 - 743
  • [26] Orchestration of Software-Defined Security Services
    Luo, Song
    Ben Salem, Malek
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2016, : 436 - 441
  • [27] The Software-Defined Network Revolution
    Canini, Marco
    Jungers, Raphael
    [J]. ERCIM NEWS, 2014, (97): : 18 - 19
  • [28] Software-Defined Mobile Networks Security
    Chen, Min
    Qian, Yongfeng
    Mao, Shiwen
    Tang, Wan
    Yang, Ximin
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05): : 729 - 743
  • [29] On Security in Software-Defined Vehicular Cloud
    Kim, Myeongsu
    Jang, Insun
    Choo, Sukjin
    Pack, Sangheon
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 1259 - 1260
  • [30] Security Analysis of a Software-Defined Radar
    Yerkes, Blake
    Ramsey, Benjamin
    Rice, Mason
    Pecarina, John
    Dunlap, Stephen
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 386 - 395