Skip to main content

Information Security of SDN on the Basis of Meta Data

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10446))

Abstract

Information security of SDN (Software Defined Network) is a part of support of information security in service-oriented architectures and clouds. These services can be presented in the form of tasks and the sets of subtasks and/or tasks represented by schedule diagrams of subtasks. Therefore it is necessary to consider the integrated information security system of such services.

The model of security of cloud computing on the basis of interaction between level of tasks and level of SDN is constructed. It is shown that meta data about solvable tasks can be used for effective control of information flows at a network and can reduce the level of network threats. The constructed protocols allow different strength of a security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Grusho, A.A., Abaev, P.O., Shorgin, S.Y., Timonina, E.E.: Graphs for information security control in software defined networks. In: AIP Conference Proceedings (2017). (to be published)

    Google Scholar 

  2. Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A.V., Imran, M.: Security in software-defined networking: threats and countermeasures. J. Mob. Netw. Appl. 21(5), 764–776 (2016). doi:10.1007/s11036-016-0676-x

    Article  Google Scholar 

  3. Luo, S., Wu, J., Li, J., Guo, L., Pei, B.: Context-aware traffic forwarding service for applications in SDN. In: IEEE International Conference on Smart City/SocialCom/SustainCom, pp. 557–561. IEEE Press, New York (2015). doi:10.1109/SmartCity. 2015.128

  4. Fergusson, A.D., Guha, A., Liang, C., Fonseca, R., Krishnamurthi, S.: Hierarchical policies for software defined networks. In: HotSDN 2012, 13 August, Helsinki, pp. 37–41. ACM (2012). doi:10.1145/2342441.2342450

  5. Sokolov, V., Alekseev, I., Mazilov, D., Nikitinskiy, M.: A network analytics system in the SDN. In: SDN and NFV: The Next Generation of Computational Infrastructure: 2014 International Science and Technology Conference Modern Networking Technologies (MoNeTec), pp. 160–162. MAKS Press, Moscow (2014)

    Google Scholar 

  6. Pantuza, G., Sampaio, F., Viera, L., Guedes, D., Viera, M.: Network management through graphs in software defined network. In: 10th CNSM and Workshop, pp. 400–405. IFIP (2014)

    Google Scholar 

  7. McGeer, R.: A safe, efficient update protocol for OpenFlow networks. In: HotSDN 2012, August 13, Helsinki, pp. 61–66. ACM (2012)

    Google Scholar 

  8. Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A., Piskovski, V.O.: Secure automatic reconfiguration of cloudy computing. J. Syst. Means Inform. 26(3), 83–92 (2016). doi:10.14357/08696527160306

    Google Scholar 

  9. Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A.: On the advanced procedure to reduce calculation of Galois closures. J. Inform. Appl. 10(4), 97–106 (2016). doi:10.14357/19922264160410

    Google Scholar 

  10. Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A.: Information flow monitoring and control in cloud computing environment. J. Inform. Appl. 9(4), 95–101 (2015). doi:10.14357/1992264150410

    Google Scholar 

  11. Grusho, A., Grusho, N., Piskovski, V., Timonina, E.: Five SDN-oriented directions in information security. In: SDN and NFV: The Next Generation of Computational Infrastructure: 2014 International Science and Technology Conference Modern Networking Technologies (MoNeTec), pp. 68–71. MAKS Press, Moscow (2014). doi:10.1109/MoNeTeC.2014.6995586

  12. Nilsson, N.J.: Problem-Solving Methods in Artificial Intelligence. McGraw-Hill Pub. Co., New York (1971)

    Google Scholar 

  13. Lazarev, A.A., Gafarov, E.R.: Scheduling Theory. Tasks and Algorithms. Publ. House MSU, Moscow (2011)

    Google Scholar 

Download references

Acknowledgements

The research is supported by Russian Foundation for Basic Research (project 15-29-07981, project 15-07-02053).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Grusho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Grusho, A., Grusho, N., Zabezhailo, M., Zatsarinny, A., Timonina, E. (2017). Information Security of SDN on the Basis of Meta Data. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65127-9_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65126-2

  • Online ISBN: 978-3-319-65127-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics