Critical Information Infrastructures Monitoring Based on Software-Defined Networks

The paper deals with the problem of control of critical information infrastructures (CII) in order to ensure information security and functional reliability. It is proved that safety in such systems primarily affects the availability - that is, ensuring and maintaining the functionality and performa...

Full description

Bibliographic Details
Main Authors: Sergey Erokhin, Andrey Petukhov, Pavel Pilyugin
Format: Article
Language:English
Published: FRUCT 2019-04-01
Series:Proceedings of the XXth Conference of Open Innovations Association FRUCT
Subjects:
Online Access:https://fruct.org/publications/abstract24/files/Ero.pdf
_version_ 1819043034378010624
author Sergey Erokhin
Andrey Petukhov
Pavel Pilyugin
author_facet Sergey Erokhin
Andrey Petukhov
Pavel Pilyugin
author_sort Sergey Erokhin
collection DOAJ
description The paper deals with the problem of control of critical information infrastructures (CII) in order to ensure information security and functional reliability. It is proved that safety in such systems primarily affects the availability - that is, ensuring and maintaining the functionality and performance of all components of the CII. In second place is usually integrity, and the lowest priority is given to confidentiality. It is proposed to universalize monitoring information and telecommunication base of the CII. Software-defined networks (SDN) are considered as such base. Such monitoring will allow monitoring the state of the functionality of the information technology base of the CII objects and also to detect various violations of the functionality and anomalies in the operation of the information system and control systems. The monitoring protocols of traditional networks (NetFlow, sFlow) and SDN (OpenFlow) are compared. The analysis shows that the SDN switch can export NetFlow or sFlow data for later analysis. The scheme of the two-level sensor by means of the switch of the SDN and separate specialized devices is offered. It is assumed that these sensors can analyze parameters already for L2-L7 levels, such as DPI or DLP systems.Not only can the methodology and capabilities of IDS and IPS be used in the SDN, but based on the analysis of the data obtained, the network can be centrally reprogrammed to repel malicious attacks and restore functionality. This can make CII significantly more resistant to various failures, failures and malicious attacks.
first_indexed 2024-12-21T09:50:22Z
format Article
id doaj.art-92af412755284ee684c00b97a31c185a
institution Directory Open Access Journal
issn 2305-7254
2343-0737
language English
last_indexed 2024-12-21T09:50:22Z
publishDate 2019-04-01
publisher FRUCT
record_format Article
series Proceedings of the XXth Conference of Open Innovations Association FRUCT
spelling doaj.art-92af412755284ee684c00b97a31c185a2022-12-21T19:08:12ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372019-04-0185424594598Critical Information Infrastructures Monitoring Based on Software-Defined NetworksSergey Erokhin0Andrey Petukhov1Pavel Pilyugin2Moscow Technical University of Communications and Informatics, Moscow, RussiaMoscow Technical University of Communications and Informatics, Moscow, RussiaMoscow Technical University of Communications and Informatics, Moscow, RussiaThe paper deals with the problem of control of critical information infrastructures (CII) in order to ensure information security and functional reliability. It is proved that safety in such systems primarily affects the availability - that is, ensuring and maintaining the functionality and performance of all components of the CII. In second place is usually integrity, and the lowest priority is given to confidentiality. It is proposed to universalize monitoring information and telecommunication base of the CII. Software-defined networks (SDN) are considered as such base. Such monitoring will allow monitoring the state of the functionality of the information technology base of the CII objects and also to detect various violations of the functionality and anomalies in the operation of the information system and control systems. The monitoring protocols of traditional networks (NetFlow, sFlow) and SDN (OpenFlow) are compared. The analysis shows that the SDN switch can export NetFlow or sFlow data for later analysis. The scheme of the two-level sensor by means of the switch of the SDN and separate specialized devices is offered. It is assumed that these sensors can analyze parameters already for L2-L7 levels, such as DPI or DLP systems.Not only can the methodology and capabilities of IDS and IPS be used in the SDN, but based on the analysis of the data obtained, the network can be centrally reprogrammed to repel malicious attacks and restore functionality. This can make CII significantly more resistant to various failures, failures and malicious attacks.https://fruct.org/publications/abstract24/files/Ero.pdf monitoringcritical information infrastructuresoftware-defined networksecurity
spellingShingle Sergey Erokhin
Andrey Petukhov
Pavel Pilyugin
Critical Information Infrastructures Monitoring Based on Software-Defined Networks
Proceedings of the XXth Conference of Open Innovations Association FRUCT
monitoring
critical information infrastructure
software-defined network
security
title Critical Information Infrastructures Monitoring Based on Software-Defined Networks
title_full Critical Information Infrastructures Monitoring Based on Software-Defined Networks
title_fullStr Critical Information Infrastructures Monitoring Based on Software-Defined Networks
title_full_unstemmed Critical Information Infrastructures Monitoring Based on Software-Defined Networks
title_short Critical Information Infrastructures Monitoring Based on Software-Defined Networks
title_sort critical information infrastructures monitoring based on software defined networks
topic monitoring
critical information infrastructure
software-defined network
security
url https://fruct.org/publications/abstract24/files/Ero.pdf
work_keys_str_mv AT sergeyerokhin criticalinformationinfrastructuresmonitoringbasedonsoftwaredefinednetworks
AT andreypetukhov criticalinformationinfrastructuresmonitoringbasedonsoftwaredefinednetworks
AT pavelpilyugin criticalinformationinfrastructuresmonitoringbasedonsoftwaredefinednetworks