skip to main content
10.1145/2851613.2851728acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Policy based security architecture for software defined networks

Published: 04 April 2016 Publication History

Abstract

Software Defined Network(SDN) is a promising technological advancement in the networking world. It is still evolving and security is a major concern for SDN. In this paper we proposed policy based security architecture for securing the SDN domains. Our architecture enables the administrator to enforce different types of policies such as based on the devices, users, location and path for securing the communication in SDN domain. Our architecture is developed as an application that can be run on any of the SDN Controllers. We have implemented our architecture using the POX Controller and Raspberry Pi 2 switches. We will present different case scenarios to demonstrate fine granular security policy enforcement with our architecture.

References

[1]
LINC-switch. https://github.com/FlowForwarding/LINC-Switch.
[2]
Simple network access control (SNAC). www.openow.org/wp/snac/.
[3]
D. D. Clark. Policy routing in internet protocols, 1989.
[4]
D. Estrin and G. Tsudik. Security issues in policy routing. In Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on, pages 183--193. IEEE, 1989.
[5]
N. Foster, R. Harrison, M. J. Freedman, C. Monsanto, J. Rexford, A. Story, and D. Walker. Frenetic: A network programming language. In ACM SIGPLAN Notices, volume 46, pages 279--291. ACM, 2011.
[6]
T. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. Shenker. Practical declarative network management. In Proceedings of the 1st ACM workshop on Research on enterprise networking, pages 1--10. ACM, 2009.
[7]
T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, et al. Onix: A distributed control platform for large-scale production networks. In OSDI, volume 10, pages 1--6, 2010.
[8]
J. Reich, C. Monsanto, N. Foster, J. Rexford, and D. Walker. Modular SDN programming with pyretic. Technical Reprot of USENIX, 2013.
[9]
A. Voellmy and P. Hudak. Nettle: Taking the sting out of programming network routers. In Practical Aspects of Declarative Languages, pages 235--249. Springer, 2011.
[10]
A. Voellmy, J. Wang, Y. R. Yang, B. Ford, and P. Hudak. Maple: Simplifying SDN programming using algorithmic policies. In ACM SIGCOMM Computer Communication Review, volume 43, pages 87--98. ACM, 2013.

Cited By

View all
  • (2023)Attack Detection in SDN Using RNNAdvances in Data-Driven Computing and Intelligent Systems10.1007/978-981-99-3250-4_44(585-596)Online publication date: 4-Aug-2023
  • (2021)SDN-Enabled Secure IoT ArchitectureIEEE Internet of Things Journal10.1109/JIOT.2020.30437408:8(6549-6564)Online publication date: 15-Apr-2021
  • (2020)Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring SystemTechnologies10.3390/technologies80400508:4(50)Online publication date: 26-Sep-2020
  • Show More Cited By

Index Terms

  1. Policy based security architecture for software defined networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '16: Proceedings of the 31st Annual ACM Symposium on Applied Computing
    April 2016
    2360 pages
    ISBN:9781450337397
    DOI:10.1145/2851613
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 April 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. OpenFlow
    2. POX
    3. SDN application
    4. SDN security
    5. policy based architecture

    Qualifiers

    • Research-article

    Conference

    SAC 2016
    Sponsor:
    SAC 2016: Symposium on Applied Computing
    April 4 - 8, 2016
    Pisa, Italy

    Acceptance Rates

    SAC '16 Paper Acceptance Rate 252 of 1,047 submissions, 24%;
    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Attack Detection in SDN Using RNNAdvances in Data-Driven Computing and Intelligent Systems10.1007/978-981-99-3250-4_44(585-596)Online publication date: 4-Aug-2023
    • (2021)SDN-Enabled Secure IoT ArchitectureIEEE Internet of Things Journal10.1109/JIOT.2020.30437408:8(6549-6564)Online publication date: 15-Apr-2021
    • (2020)Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring SystemTechnologies10.3390/technologies80400508:4(50)Online publication date: 26-Sep-2020
    • (2020)SDN-Capable IoT Last-Miles: Design Challenges2019 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM38437.2019.9014145(1-6)Online publication date: 17-Jun-2020
    • (2020)A forensic study of Tor usage on the Raspberry Pi platform using open source toolsComputer Fraud & Security10.1016/S1361-3723(20)30064-62020:6(13-19)Online publication date: Jan-2020
    • (2020)Software‐defined networking security for private data center networks and clouds: Vulnerabilities, attacks, countermeasures, and solutionsInternational Journal of Communication Systems10.1002/dac.470634:4Online publication date: 15-Dec-2020
    • (2019)Automatic Translation and Enforcement of Cybersecurity Policies Using A High-Level Definition LanguageEntropy10.3390/e2112118021:12(1180)Online publication date: 30-Nov-2019
    • (2019)A systematic literature review of security software defined networkProceedings of the 3rd International Conference on Telecommunications and Communication Engineering10.1145/3369555.3369567(39-45)Online publication date: 9-Nov-2019
    • (2019)A Policy-Based Security Architecture for Software-Defined NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.286822014:4(897-912)Online publication date: Apr-2019
    • (2019)DDOS Attack Detection & Prevention in SDN using OpenFlow Statistics2019 IEEE 9th International Conference on Advanced Computing (IACC)10.1109/IACC48062.2019.8971596(147-152)Online publication date: Dec-2019
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media