Flow consistency in an intensive SDN security architecture with multiple controllers

As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers...

Full description

Bibliographic Details
Main Author: LVYing-ying,GUOYun-fei,QIChao,WUQi,WANGYa-wen
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00223
_version_ 1818552249025036288
author LVYing-ying,GUOYun-fei,QIChao,WUQi,WANGYa-wen
author_facet LVYing-ying,GUOYun-fei,QIChao,WUQi,WANGYa-wen
author_sort LVYing-ying,GUOYun-fei,QIChao,WUQi,WANGYa-wen
collection DOAJ
description As critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an“associated”controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.
first_indexed 2024-12-12T09:10:44Z
format Article
id doaj.art-5afe2a0d81394fd89dd020ad85e3fe24
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-12-12T09:10:44Z
publishDate 2017-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-5afe2a0d81394fd89dd020ad85e3fe242022-12-22T00:29:31ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-12-01312627810.11959/j.issn.2096-109x.2017.00223Flow consistency in an intensive SDN security architecture with multiple controllersLVYing-ying,GUOYun-fei,QIChao,WUQi,WANGYa-wen 0National Digital Switching System Engineering&Technological R&D Center,Zhengzhou 450002,ChinaAs critical components in SDN,controllers are prone to suffer from a series of potential attacks which result in system crashes.To prevent the compromise caused by single failure of controller or flow-tampering attacks,Mcad-SA,an aware decision-making security architecture with multiple controllers was proposed,which coordinates heterogeneous controllers internally as an“associated”controller.This architecture extends existing control plane and takes advantage of various controllers’merits to improve the difficulty and cost of probes and attacks from attackers.In this framework,flow rules distributed to switches are no longer relying on a single controller but according to the vote results from the majority of controllers,which significantly enhances the reliability of flow rules.As to the vote process of flow rules,segmentation and grading is adopted to pick up the most trustful one from multiple flow rules and implement flow consistency.This mechanism avoids comparison between rules via bit by bit which is impractical among several controllers.Theory analysis and simulation results demonstrates the effectiveness,availability and resilience of the proposed methods and their better security gain over general SDN architectures.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00223multi-controllersecuritymcad-saflow consistency
spellingShingle LVYing-ying,GUOYun-fei,QIChao,WUQi,WANGYa-wen
Flow consistency in an intensive SDN security architecture with multiple controllers
网络与信息安全学报
multi-controller
security
mcad-sa
flow consistency
title Flow consistency in an intensive SDN security architecture with multiple controllers
title_full Flow consistency in an intensive SDN security architecture with multiple controllers
title_fullStr Flow consistency in an intensive SDN security architecture with multiple controllers
title_full_unstemmed Flow consistency in an intensive SDN security architecture with multiple controllers
title_short Flow consistency in an intensive SDN security architecture with multiple controllers
title_sort flow consistency in an intensive sdn security architecture with multiple controllers
topic multi-controller
security
mcad-sa
flow consistency
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00223
work_keys_str_mv AT lvyingyingguoyunfeiqichaowuqiwangyawen flowconsistencyinanintensivesdnsecurityarchitecturewithmultiplecontrollers