Critical Information Infrastructures Monitoring Based on Software-Defined Networks
The paper deals with the problem of control of critical information infrastructures (CII) in order to ensure information security and functional reliability. It is proved that safety in such systems primarily affects the availability - that is, ensuring and maintaining the functionality and performa...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2019-04-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://fruct.org/publications/abstract24/files/Ero.pdf
|
_version_ | 1819043034378010624 |
---|---|
author | Sergey Erokhin Andrey Petukhov Pavel Pilyugin |
author_facet | Sergey Erokhin Andrey Petukhov Pavel Pilyugin |
author_sort | Sergey Erokhin |
collection | DOAJ |
description | The paper deals with the problem of control of critical information infrastructures (CII) in order to ensure information security and functional reliability. It is proved that safety in such systems primarily affects the availability - that is, ensuring and maintaining the functionality and performance of all components of the CII. In second place is usually integrity, and the lowest priority is given to confidentiality. It is proposed to universalize monitoring information and telecommunication base of the CII. Software-defined networks (SDN) are considered as such base. Such monitoring will allow monitoring the state of the functionality of the information technology base of the CII objects and also to detect various violations of the functionality and anomalies in the operation of the information system and control systems. The monitoring protocols of traditional networks (NetFlow, sFlow) and SDN (OpenFlow) are compared. The analysis shows that the SDN switch can export NetFlow or sFlow data for later analysis. The scheme of the two-level sensor by means of the switch of the SDN and separate specialized devices is offered. It is assumed that these sensors can analyze parameters already for L2-L7 levels, such as DPI or DLP systems.Not only can the methodology and capabilities of IDS and IPS be used in the SDN, but based on the analysis of the data obtained, the network can be centrally reprogrammed to repel malicious attacks and restore functionality. This can make CII significantly more resistant to various failures, failures and malicious attacks. |
first_indexed | 2024-12-21T09:50:22Z |
format | Article |
id | doaj.art-92af412755284ee684c00b97a31c185a |
institution | Directory Open Access Journal |
issn | 2305-7254 2343-0737 |
language | English |
last_indexed | 2024-12-21T09:50:22Z |
publishDate | 2019-04-01 |
publisher | FRUCT |
record_format | Article |
series | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
spelling | doaj.art-92af412755284ee684c00b97a31c185a2022-12-21T19:08:12ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372019-04-0185424594598Critical Information Infrastructures Monitoring Based on Software-Defined NetworksSergey Erokhin0Andrey Petukhov1Pavel Pilyugin2Moscow Technical University of Communications and Informatics, Moscow, RussiaMoscow Technical University of Communications and Informatics, Moscow, RussiaMoscow Technical University of Communications and Informatics, Moscow, RussiaThe paper deals with the problem of control of critical information infrastructures (CII) in order to ensure information security and functional reliability. It is proved that safety in such systems primarily affects the availability - that is, ensuring and maintaining the functionality and performance of all components of the CII. In second place is usually integrity, and the lowest priority is given to confidentiality. It is proposed to universalize monitoring information and telecommunication base of the CII. Software-defined networks (SDN) are considered as such base. Such monitoring will allow monitoring the state of the functionality of the information technology base of the CII objects and also to detect various violations of the functionality and anomalies in the operation of the information system and control systems. The monitoring protocols of traditional networks (NetFlow, sFlow) and SDN (OpenFlow) are compared. The analysis shows that the SDN switch can export NetFlow or sFlow data for later analysis. The scheme of the two-level sensor by means of the switch of the SDN and separate specialized devices is offered. It is assumed that these sensors can analyze parameters already for L2-L7 levels, such as DPI or DLP systems.Not only can the methodology and capabilities of IDS and IPS be used in the SDN, but based on the analysis of the data obtained, the network can be centrally reprogrammed to repel malicious attacks and restore functionality. This can make CII significantly more resistant to various failures, failures and malicious attacks.https://fruct.org/publications/abstract24/files/Ero.pdf monitoringcritical information infrastructuresoftware-defined networksecurity |
spellingShingle | Sergey Erokhin Andrey Petukhov Pavel Pilyugin Critical Information Infrastructures Monitoring Based on Software-Defined Networks Proceedings of the XXth Conference of Open Innovations Association FRUCT monitoring critical information infrastructure software-defined network security |
title | Critical Information Infrastructures Monitoring Based on Software-Defined Networks |
title_full | Critical Information Infrastructures Monitoring Based on Software-Defined Networks |
title_fullStr | Critical Information Infrastructures Monitoring Based on Software-Defined Networks |
title_full_unstemmed | Critical Information Infrastructures Monitoring Based on Software-Defined Networks |
title_short | Critical Information Infrastructures Monitoring Based on Software-Defined Networks |
title_sort | critical information infrastructures monitoring based on software defined networks |
topic | monitoring critical information infrastructure software-defined network security |
url | https://fruct.org/publications/abstract24/files/Ero.pdf
|
work_keys_str_mv | AT sergeyerokhin criticalinformationinfrastructuresmonitoringbasedonsoftwaredefinednetworks AT andreypetukhov criticalinformationinfrastructuresmonitoringbasedonsoftwaredefinednetworks AT pavelpilyugin criticalinformationinfrastructuresmonitoringbasedonsoftwaredefinednetworks |