Summary Software‐Defined Networking (SDN) has radically changed how we manage our network, increasing flexibility, and enabling network programmability. Providing security for tenants is one of the most significant issues in SDN. In this paper, our goal is to introduce with an educational use case, four types of attack vectors associated with malicious tenants that seriously challenge the SDN foundation. We also provide suggestions to teach how to investigate the mitigation of these techniques against the attacks. Our solution, to be tested in the classroom, introduce an approach that utilizes several concepts, such as a topological graph to detect malicious tenants. Unlike other methods to teach how to secure SDNs, our proposed approach teaches how to detect and secure a system without requiring any changes to the underlying protocols.
Teaching Software-Defined Network Security Through Malicious Tenant Detection / Abazari, Farzaneh; Esposito, Flavio; Takabi, Hassan; Hosseinvand, Hamid; Pecorella, Tommaso. - In: INTERNET TECHNOLOGY LETTERS. - ISSN 2476-1508. - ELETTRONICO. - 2:(2019), pp. 1-6. [10.1002/itl2.131]
Teaching Software-Defined Network Security Through Malicious Tenant Detection
Pecorella, Tommaso
2019
Abstract
Summary Software‐Defined Networking (SDN) has radically changed how we manage our network, increasing flexibility, and enabling network programmability. Providing security for tenants is one of the most significant issues in SDN. In this paper, our goal is to introduce with an educational use case, four types of attack vectors associated with malicious tenants that seriously challenge the SDN foundation. We also provide suggestions to teach how to investigate the mitigation of these techniques against the attacks. Our solution, to be tested in the classroom, introduce an approach that utilizes several concepts, such as a topological graph to detect malicious tenants. Unlike other methods to teach how to secure SDNs, our proposed approach teaches how to detect and secure a system without requiring any changes to the underlying protocols.File | Dimensione | Formato | |
---|---|---|---|
Abazari_et_al-2019-Internet_Technology_Letters.pdf
accesso aperto
Tipologia:
Pdf editoriale (Version of record)
Licenza:
Tutti i diritti riservati
Dimensione
373.07 kB
Formato
Adobe PDF
|
373.07 kB | Adobe PDF |
I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.