Abstract
Information security of SDN (Software Defined Network) is a part of support of information security in service-oriented architectures and clouds. These services can be presented in the form of tasks and the sets of subtasks and/or tasks represented by schedule diagrams of subtasks. Therefore it is necessary to consider the integrated information security system of such services.
The model of security of cloud computing on the basis of interaction between level of tasks and level of SDN is constructed. It is shown that meta data about solvable tasks can be used for effective control of information flows at a network and can reduce the level of network threats. The constructed protocols allow different strength of a security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Grusho, A.A., Abaev, P.O., Shorgin, S.Y., Timonina, E.E.: Graphs for information security control in software defined networks. In: AIP Conference Proceedings (2017). (to be published)
Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A.V., Imran, M.: Security in software-defined networking: threats and countermeasures. J. Mob. Netw. Appl. 21(5), 764–776 (2016). doi:10.1007/s11036-016-0676-x
Luo, S., Wu, J., Li, J., Guo, L., Pei, B.: Context-aware traffic forwarding service for applications in SDN. In: IEEE International Conference on Smart City/SocialCom/SustainCom, pp. 557–561. IEEE Press, New York (2015). doi:10.1109/SmartCity. 2015.128
Fergusson, A.D., Guha, A., Liang, C., Fonseca, R., Krishnamurthi, S.: Hierarchical policies for software defined networks. In: HotSDN 2012, 13 August, Helsinki, pp. 37–41. ACM (2012). doi:10.1145/2342441.2342450
Sokolov, V., Alekseev, I., Mazilov, D., Nikitinskiy, M.: A network analytics system in the SDN. In: SDN and NFV: The Next Generation of Computational Infrastructure: 2014 International Science and Technology Conference Modern Networking Technologies (MoNeTec), pp. 160–162. MAKS Press, Moscow (2014)
Pantuza, G., Sampaio, F., Viera, L., Guedes, D., Viera, M.: Network management through graphs in software defined network. In: 10th CNSM and Workshop, pp. 400–405. IFIP (2014)
McGeer, R.: A safe, efficient update protocol for OpenFlow networks. In: HotSDN 2012, August 13, Helsinki, pp. 61–66. ACM (2012)
Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A., Piskovski, V.O.: Secure automatic reconfiguration of cloudy computing. J. Syst. Means Inform. 26(3), 83–92 (2016). doi:10.14357/08696527160306
Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A.: On the advanced procedure to reduce calculation of Galois closures. J. Inform. Appl. 10(4), 97–106 (2016). doi:10.14357/19922264160410
Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A.: Information flow monitoring and control in cloud computing environment. J. Inform. Appl. 9(4), 95–101 (2015). doi:10.14357/1992264150410
Grusho, A., Grusho, N., Piskovski, V., Timonina, E.: Five SDN-oriented directions in information security. In: SDN and NFV: The Next Generation of Computational Infrastructure: 2014 International Science and Technology Conference Modern Networking Technologies (MoNeTec), pp. 68–71. MAKS Press, Moscow (2014). doi:10.1109/MoNeTeC.2014.6995586
Nilsson, N.J.: Problem-Solving Methods in Artificial Intelligence. McGraw-Hill Pub. Co., New York (1971)
Lazarev, A.A., Gafarov, E.R.: Scheduling Theory. Tasks and Algorithms. Publ. House MSU, Moscow (2011)
Acknowledgements
The research is supported by Russian Foundation for Basic Research (project 15-29-07981, project 15-07-02053).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Grusho, A., Grusho, N., Zabezhailo, M., Zatsarinny, A., Timonina, E. (2017). Information Security of SDN on the Basis of Meta Data. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-65127-9_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65126-2
Online ISBN: 978-3-319-65127-9
eBook Packages: Computer ScienceComputer Science (R0)