OperationCheckpoint: SDN Application Control


Autoria(s): Scott-Hayward, S.; Kane, C.; Sezer, S.
Data(s)

01/10/2014

Resumo

One of the core properties of Software Defined Networking (SDN) is the ability for third parties to develop network applications. This introduces increased potential for innovation in networking from performance-enhanced to energy-efficient designs. In SDN, the application connects with the network via the SDN controller. A specific concern relating to this communication channel is whether an application can be trusted or not. For example, what information about the network state is gathered by the application? Is this information necessary for the application to execute or is it gathered for malicious intent? In this paper we present an approach to secure the northbound interface by introducing a permissions system that ensures that controller operations are available to trusted applications only. Implementation of this permissions system with our Operation Checkpoint adds negligible overhead and illustrates successful defense against unauthorized control function access attempts.

Formato

application/pdf

Identificador

http://pure.qub.ac.uk/portal/en/publications/operationcheckpoint-sdn-application-control(8259c36a-569c-46dd-b608-22c8e8ace591).html

http://dx.doi.org/10.1109/ICNP.2014.98

http://pure.qub.ac.uk/ws/files/13871005/OperationCheckpoint.pdf

Idioma(s)

eng

Direitos

info:eu-repo/semantics/openAccess

Fonte

Scott-Hayward , S , Kane , C & Sezer , S 2014 , OperationCheckpoint: SDN Application Control . in The 22nd IEEE International Conference on Network Protocols (ICNP 2014) . pp. 618-623 , IEEE International Conference on Network Protocols (ICNP) , Raleigh , United States , 21-24 October . DOI: 10.1109/ICNP.2014.98

Tipo

contributionToPeriodical