SDN testbed for validation of cross-layer data-centric security policies

被引:0
|
作者
Wrona, Konrad [1 ]
Szwaczyk, Sebastian [2 ]
Amanowicz, Marek [3 ]
Gierlowski, Krzysztof [4 ]
机构
[1] NATO Commun & Informat Agcy, The Hague, Netherlands
[2] Mil Univ Technol, Warsaw, Poland
[3] Res & Acad Comp Network, Warsaw, Poland
[4] Gdansk Univ Technol, Gdansk, Poland
关键词
Access control; communication system security; data security; information security; software-defined networking; PROTECTED CORE NETWORKING;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was developed with a specific focus on validation of SDN security mechanisms - including both the mechanisms for protecting the software-defined network layer and the cross-layer enforcement of higher level policies, such as data-centric security policies. We also present initial experimentation results obtained using the testbed, which confirm its ability to validate simulation and analytic predictions. Our objective is to provide a sufficiently detailed description of the configuration used in our testbed so that it can be easily re-plicated and re-used by other security researchers in their experiments.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Data-Centric Security for the IoT
    Schreckling, Daniel
    Parra, Juan David
    Doukas, Charalampos
    Posegga, Joachim
    [J]. INTERNET OF THINGS: IOT INFRASTRUCTURES, IOT 360, PT II, 2016, 170 : 77 - 86
  • [2] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [3] Data-centric security: Integrating data privacy and data security
    Hennessy, Shawn D.
    Lauer, George D.
    Zunic, Nev
    Gerber, Benjamin
    Nelson, Adam C.
    [J]. IBM Journal of Research and Development, 2009, 53 (02):
  • [4] A data-centric security analysis of ICGrid
    Luna, Jesus
    Flouris, Michail
    Marazakis, Manolis
    Bilas, Angelos
    [J]. GRID COMPUTING: ACHIEVEMENTS AND PROSPECTS, 2008, : 197 - 208
  • [5] EFFECT OF SECURITY ARCHITECTURE ON CROSS-LAYER SIGNALING IN NETWORK CENTRIC SYSTEMS
    Lee, Junghoon
    Elmasry, George F.
    Jain, Manoj
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 2192 - 2196
  • [6] Towards Data-Centric Security in Ubiquitous Computing Environments
    Ransom, Stefan
    Werner, Christian
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, 2009, : 26 - 30
  • [7] Verification and Validation of Formal Data-Centric Business Models
    Umarov, Timur
    [J]. SCIENTIFIC ANNALS OF COMPUTER SCIENCE, 2015, 25 (02) : 317 - 355
  • [8] Verification and Validation of Formal Data-Centric Business Models
    Umarov, Timur
    Kamun, Rustem
    Omarov, Askhat
    Altayev, Sanzhar
    [J]. EMBRACING GLOBAL COMPUTING IN EMERGING ECONOMIES, EGC 2015, 2015, 514 : 134 - 147
  • [9] On the Implementation of a Cross-Layer SDN Architecture for 802.11 MANETs
    Syrigos, Ilias
    Koukoulis, Ippokratis
    Prassas, Apostolis
    Choumas, Kostas
    Korakis, Thanasis
    [J]. ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 653 - 659
  • [10] Cross-layer Wireless Information Security
    Song, Lixing
    Wu, Shaoen
    [J]. 2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,