2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) 2017
DOI: 10.1109/nfv-sdn.2017.8169858
|View full text |Cite
|
Sign up to set email alerts
|

Component integrity guarantees in software-defined networking infrastructure

Abstract: Abstract-Operating system level virtualization containers are commonly used to deploy virtual network functions (VNFs) which access the centralized network controller in software-defined networking (SDN) infrastructure. While this allows flexible network configuration, it also increases the attack surface, as sensitive information is transmitted between the controller and the virtual network functions. In this work we propose a mechanism for bootstrapping secure communication between the SDN controller and dep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…While virtualized network functions offer great advantages in terms of flexibility, they also open up vulnerability to intrusion attacks. To counter this, Girtler and Paladi [38] propose a mechanism that secures communication between the SDN controller and the network applications and thus enables integrity (DR6).…”
Section: Discussionmentioning
confidence: 99%
“…While virtualized network functions offer great advantages in terms of flexibility, they also open up vulnerability to intrusion attacks. To counter this, Girtler and Paladi [38] propose a mechanism that secures communication between the SDN controller and the network applications and thus enables integrity (DR6).…”
Section: Discussionmentioning
confidence: 99%
“…SCONE allows operators to protect the secrecy and integrity of computing in containers against host root access adversaries [21]. An alternative approach to securing virtual network functions running in containers, which prevents the unnecessary expansion of the trusted computing foundation, is proposed in [22]. Event Controller Eviction mitigates DoS attacks and OpenFlow Application overflow [23].…”
Section: Related Workmentioning
confidence: 99%
“…SCONE enables operators to protect confidentiality and integrity of computation in containers against adversaries with host root access [16]. An alternative approach to protecting virtual network functions running in containers, that avoids the excessive expansion of the trusted computing base is presented in [17].…”
Section: F Related Workmentioning
confidence: 99%