Network Intrusion Detection And Prevention Middlebox Management In SDN

被引:0
|
作者
Wang, Wen [1 ]
He, Wenbo [1 ]
Su, Jinshu [2 ]
机构
[1] McGill Univ, Sch Comp Sci, Montreal, PQ, Canada
[2] Natl Univ Def Technol, Sch Comp, Changsha, Hunan, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In traditional networks, it is difficult to manage the distributed detection and prevention nodes of IDS and IPS due to the laborious manual deployment and independent configuration. Software defined networking (SDN) provides a flexible approach to control the underlying network infrastructures efficiently. However, the OpenFlow flow table is too simple to provide complex functions with the match-action style processing. To support more functionalities, in this paper, we propose a middlebox management architecture with SDN OpenMiddlebox, by extending OpenFlow to support middleboxes with ClickOS virtual machines (VM), so that programmable middleboxes could be deployed and managed in switches with fast booted ClickOS VMs flexibly. We then design automatic deployment and update schemes of network intrusion detection and prevention middleboxes with the centralized controller. The evaluation results show that OpenMiddlebox could manage the distributed middleboxes efficiently and is scalable to large networks, and the centralized control also improves the network intrusion detection and prevention accuracy.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Intrusion Detection System based on the SDN Network, Bloom Filter and Machine Learning
    Issa, Traore
    Tiemoman, Kone
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (09) : 406 - 412
  • [32] Review of AI Techniques in development of Network Intrusion Detection System in SDN Framework
    Dahiya, Seema
    Siwach, Vikas
    Sehrawat, Harkesh
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 168 - +
  • [33] SDN based Intrusion Detection and Prevention Systems using Manufacturer Usage Description: A Survey
    Mazhar, Noman
    Salleh, Rosli
    Hossain, Mohammad Asif
    Zeeshan, Muhammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (12) : 717 - 737
  • [34] Intrusion detection and intrusion prevention on a large network. A case study.
    Dunigan, T
    Hinkel, G
    PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), 1999, : 11 - 17
  • [35] Security configuration management in Intrusion Detection and Prevention Systems
    Alsubhi, K.
    Alhazmi, Y.
    Bouabdallah, N.
    Boutaba, R.
    International Journal of Security and Networks, 2012, 7 (01) : 30 - 39
  • [36] Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
    Junchi XING
    Chunming WU
    Haifeng ZHOU
    Qiumei CHENG
    Danrui YU
    Mayra MACAS
    Science China(Information Sciences), 2022, 65 (08) : 279 - 281
  • [37] Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
    Xing, Junchi
    Wu, Chunming
    Zhou, Haifeng
    Cheng, Qiumei
    Yu, Danrui
    Macas, Mayra
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (08)
  • [38] SDN Assisted Middlebox Synchronization Mechanism for Next Generation Mobile Data Management System
    Raja, Gunasekaran
    Kottursamy, Kottilingam
    Chaudhary, Sajjad Hussain
    Hassan, Ali
    Alqarni, Mohammed
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [39] Packet Information Collection and Transformation for Network Intrusion Detection and Prevention
    Beheshti, Mohsen
    Han, Jianchao
    Kowalski, Kazimierz
    Ortiz, Joel
    Tomelden, Johnly
    Alvillar, Damian
    2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 42 - 48
  • [40] Intrusion Detection and Prevention using Honeypot Network for Cloud Security
    Negi, Poorvika Singh
    Garg, Aditya
    Lal, Roshan
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 129 - 132