An SDN-Based Approach to Enhance the End-to-End Security: SSL/TLS Case Study

被引:0
|
作者
Ranjbar, Alireza [1 ]
Komu, Miika [1 ]
Salmela, Patrik [1 ]
Aura, Tuomas [2 ]
机构
[1] Ericsson Res, Helsinki, Finland
[2] Aalto Univ, Espoo, Finland
关键词
Software-Defined Networking; SSL/TLS; Centralized policy management; Handshake analysis; Flow verification;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
End-to-end encryption is becoming the norm for many applications and services. While this improves privacy of individuals and organizations, the phenomenon also raises new kinds of challenges. For instance, with the increase of devices using encryption, the volumes of outdated, exploitable encryption software also increases. This may create some distrust amongst the users against security unless its quality is enforced in some ways. Unfortunately, deploying new mechanisms at the end-points of the communication is challenging due to the sheer volume of devices, and modifying the existing services may not be feasible either. Hence, we propose a novel method for improving the quality of the secure sessions in a centralized way based on the SDN architecture. Instead of inspecting the encrypted traffic, our approach enhances the quality of secure sessions by analyzing the plaintext handshake messages exchanged between a client and server. We exploit the fact that many of today's security protocols negotiate the security parameters such as the protocol version, encryption algorithms or certificates in plaintext in a protocol handshake before establishing a secure session. By verifying the negotiated information in the handshake, our solution can improve the security level of SSL/TLS sessions. While the approach can be extended to many other protocols, we focus on the SSL/TLS protocol in this paper because of its wide-spread use. We present our implementation for the OpenDaylight controller and evaluate its overhead to SSL/TLS session establishment in terms of latency.
引用
收藏
页码:281 / 288
页数:8
相关论文
共 50 条
  • [41] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [42] On the Security of End-to-End Measurements Based on Packet-Pair Dispersions
    Karame, Ghassan O.
    Danev, Boris
    Bannwart, Cyrill
    Capkun, Srdjan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 149 - 162
  • [43] DHS domestic municipal end-to-end water security architecture study
    Michael Baker Jr., Inc., Pagosa Springs, CO
    不详
    不详
    Annu. Water Distrib. Sys. Anal. Symp., 2007, (116):
  • [44] A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks
    Shudrenko, Yevhenii
    Ploeger, Daniel
    Kuladinithi, Koojana
    Timm-Giel, Andreas
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [45] End-to-end security validation of IoT systems based on digital twins of end-devices
    Maillet-Contoz, Laurent
    Michel, Emmanuel
    Nava, Mario Diaz
    Brun, Paul-Emmanuel
    Lepretre, Kevin
    Massot, Guillemette
    2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
  • [46] Guaranteeing end-to-end QoS provisioning in SOA based SDN architecture: A survey and Open Issues
    Khan, Shuraia
    Hussain, Farookh Khadeer
    Hussain, Omar K.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 119 : 176 - 187
  • [47] Ensuring end-to-end QoS based on multi-paths routing using SDN technology
    Dutra, Diego Leonel Cadette
    Bagaa, Miloud
    Taleb, Tarik
    Samdanis, Konstantinos
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [48] End-to-End Delay Minimization based Joint Route Selection and Network Function Placement in SDN
    Huang, Leilei
    Chai, Rong
    Chen, Qianbin
    Jin, Chun
    2018 10TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2018,
  • [49] Using Reactive Synthesis: An End-to-End Exploratory Case Study
    Ma'ayan, Dor
    Maoz, Shahar
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 742 - 754
  • [50] A Case Study on an End-to-End Safety Risk Management Process
    Yellamati, David Deepak
    Goktas, Yavuz
    Hu, Yunwei
    2024 ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, RAMS, 2024,