ASTRAEA: Towards an effective and usable application permission system for SDN

被引:5
|
作者
Kang, Heedo [1 ]
Yoon, Changhoon [1 ]
Shin, Seungwon [1 ]
机构
[1] Korea Adv Inst Sci & Technol, 291 Daehak Ro, Daejeon, South Korea
关键词
Software-defined networking security; Permission system;
D O I
10.1016/j.comnet.2019.03.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today, Software-defined networking (SDN), which decouples the control plane from the data plane, has quickly emerged as a new promising networking architecture. In SDN, a centralized control plane (a.k.a., SDN controller) manages the entire network; hence, the security of this control plane has become increasingly important. One of the critical security issues, recently raised, is that an SDN application can unrestrictedly access SDN resources, manipulate the operations of an SDN controller, and finally destroy the network. To address this issue, researchers have proposed permission-based access control models for an SDN controller, and well-known SDN controllers have recently started employing these ideas. However, permission-based access control mechanisms can be evaded by excessively/insufficiently privileged applications (i.e., permission gap), and SDN controllers employing such mechanisms are no exception. In addition, it is possible that the permissions required for an application are not clearly presented to an administrator (i.e., semantic gap). Since an SDN controller directly manages a network, the damage caused by this problem would be much more serious. To address this issue, in this paper, we introduce a novel and usable security mechanism called ASTRAEA that can effectively help SDN operators avoid such potentially dangerous SDN applications. (C) 2019 Published by Elsevier.B.V.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [31] An Effective Object Recognition System by a Mobile Application
    Tseng, Wen-Yen
    Chen, Kai-Hsiang
    Huang, Jen-Wei
    2017 10TH INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS (UBI-MEDIA), 2017, : 436 - 441
  • [32] Application research of effective space on logistics system
    Zhao, P
    Zhang, Q
    Li, BB
    Wang, Y
    Yang, XT
    2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 302 - 304
  • [33] Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
    Choi, Jusop
    Cho, Junsung
    Kim, Hyoungshick
    Hyun, Sangwon
    APPLIED SCIENCES-BASEL, 2020, 10 (06):
  • [34] Towards Application-Aware Networking: ML-based End-to-End Application KPI/QoE Metrics Characterization in SDN
    Jahromi, Hamed Z.
    Hines, Andrew
    Delaney, Declan T.
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 126 - 131
  • [35] Towards a highly effective and robust Web credibility evaluation system
    Liu, Xin
    Nielek, Radoslaw
    Adamska, Paulina
    Wierzbicki, Adam
    Aberer, Karl
    DECISION SUPPORT SYSTEMS, 2015, 79 : 99 - 108
  • [36] Towards an improved and more cost effective health system for Australia
    Fisher, DA
    Snelling, PL
    MEDICAL JOURNAL OF AUSTRALIA, 1998, 169 (02) : 117 - 118
  • [37] Towards a Practical and Cost-Effective Water Monitoring System
    Marques, Joao
    Lopes, Brigida
    Ferreira, Carlos
    Pinho, Henrique
    Barros, Manuel
    Granchinho, Pedro
    Neves, Pedro
    TECHNOLOGICAL INNOVATION FOR INDUSTRY AND SERVICE SYSTEMS, DOCEIS 2019, 2019, 553 : 266 - 272
  • [38] Distributed Generation: towards an effective contribution to power system security
    Meyer, B.
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 1758 - 1763
  • [39] Towards an Effective Agricultural e-Trading System in India
    Suri, P. K.
    GLOBAL VALUE CHAINS, FLEXIBILITY AND SUSTAINABILITY, 2018, : 187 - 203
  • [40] Towards an improved and more cost effective health system for Australia
    Harper, RW
    MEDICAL JOURNAL OF AUSTRALIA, 1998, 168 (06) : 286 - +