A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models
Autor: | Dong Seong Kim, Jong Sou Park, Jin B. Hong, Taehoon Eom, Seongmo An |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2020 |
Předmět: |
021110 strategic
defence & security studies Science (General) Computational complexity theory Article Subject Computer Networks and Communications Computer science Distributed computing Control (management) 0211 other engineering and technologies 020206 networking & telecommunications 02 engineering and technology Computer security model Flow network Q1-390 Precomputation Component (UML) 0202 electrical engineering electronic engineering information engineering T1-995 Table (database) Software-defined networking Technology (General) Information Systems |
Zdroj: | Security and Communication Networks, Vol 2020 (2020) |
ISSN: | 1939-0114 |
DOI: | 10.1155/2020/7235043 |
Popis: | Software defined networking (SDN) has been adopted in many application domains as it provides functionalities to dynamically control the network flow more robust and more economical compared to the traditional networks. In order to strengthen the security of the SDN against cyber attacks, many security solutions have been proposed. However, those solutions need to be compared in order to optimize the security of the SDN. To assess and evaluate the security of the SDN systematically, one can use graphical security models (e.g., attack graphs and attack trees). However, it is difficult to provide defense against an attack in real time due to their high computational complexity. In this paper, we propose a real-time intrusion response in SDN using precomputation to estimate the likelihood of future attack paths from an ongoing attack. We also take into account various SDN components to conduct a security assessment, which were not available when addressing only the components of an existing network. Our experimental analysis shows that we are able to estimate possible attack paths of an ongoing attack to mitigate it in real time, as well as showing the security metrics that depend on the flow table, including the SDN component. Hence, the proposed approach can be used to provide effective real-time mitigation solutions for securing SDN. |
Databáze: | OpenAIRE |
Externí odkaz: |