...
首页> 外文期刊>International Journal of High Performance Computing and Networking >Securing SDN controller and switches from attacks
【24h】

Securing SDN controller and switches from attacks

机译:保护SDN控制器并从攻击切换

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we propose techniques for securing the SDN controller and the switches from malicious end-host attacks. Our model makes use of trusted computing and introspection-based intrusion detection to deal with attacks in SDN. We have developed a security application for the SDN controller to validate the state of the switches in the data plane and enforce the security policies to monitor the virtual machines at system call level and detect attacks. We have developed a feature extraction method named vector of n-grams which represents the traces in an efficient way without losing the ordering of system calls. The flows from the malicious hosts are dropped before they are processed by the switches or forwarded to the SDN controller. Hence, our model protects the switches and the SDN controller from the attacks.
机译:在本文中,我们提出了从恶意最终主机攻击中保护SDN控制器和交换机的技术。 我们的模型利用可信计算和基于内省的入侵检测来处理SDN中的攻击。 我们已经开发了SDN控制器的安全应用程序,以验证数据平面中的交换机的状态,并强制执行安全策略以在系统调用级别监视虚拟机并检测攻击。 我们开发了一个名为N-GRAM的传染媒介的特征提取方法,其以有效的方式表示迹线而不丢失系统调用的排序。 在由交换机处理或转发到SDN控制器之前,删除来自恶意主机的流程。 因此,我们的模型可以保护交换机和SDN控制器免受攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号