Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017 (2017), Article ID 8740217, 11 pages
https://doi.org/10.1155/2017/8740217
Research Article

Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China

Correspondence should be addressed to Zehui Wu

Received 22 June 2016; Revised 20 November 2016; Accepted 24 January 2017; Published 1 March 2017

Academic Editor: Jean-Christophe Ponsart

Copyright © 2017 Zehui Wu and Qiang Wei. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Q.-Y. Zuo, M. Chen, G.-S. Zhao, C.-Y. Xing, G.-M. Zhang, and P.-C. Jiang, “Research on OpenFlow-based SDN technologies,” Journal of Software, vol. 24, no. 5, pp. 1078–1097, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. I. Alsmadi and D. Xu, “Security of software defined networks: a survey,” Computers and Security, vol. 53, pp. 79–106, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. Icebeen, “Google’s using SDN to realize data centers interconnection[EB/OL],” 2014, http://www.educity.cn/net/1417699.html.
  4. Nicira: network virtualization—next revolution of the Internet, 2012–2016, http://www.199it.com/archives/33042.html.
  5. Z. Zou, Facebook launches its ‘Wedge’ switches for open data centers, June 2014, http://network.chinabyte.com/225/12992725.shtml.
  6. Z. Wu, HuaWei publishes 2014 serial SDN solutions, March 2014, http://www.wuzhongzx.com/zxzx/show.php?itemid=718892.
  7. Agile Network of HuaWei, HNC2015|HuaWei publishes the first SDN-based agile IOT solution in the world, May 2015, http://www.wtoutiao.com/p/e78rQ1.html.
  8. J. Skorupa, M. Fabbi, and A. K. Sharma, Ending the Confusion About Software-Defined Networking: A Taxonomy, Gartner—G00248592, 2013, http://www.gartner.com/id=2367616.
  9. Y. Jarraya, T. Madi, and M. Debbabi, “A survey and a layered taxonomy of software-defined networking,” IEEE Communications Surveys and Tutorials, vol. 16, no. 4, pp. 1955–1980, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Dover, A switch table vulnerability in the Open Floodlight SDN controller, March 2014, http://dovernetworks.com/wp-content/uploads/2014/03/OpenFloodlight-03052014.pdf.
  11. M. Dover, A denial of service attack against the Open Floodlight SDN controller, December 2013, http://dovernetworks.com/wp-content/uploads/2013/12/OpenFloodlight-12302013.pdf.
  12. S. Hong, L. Xu, H. Wang, and G. Gu, “Poisoning network visibility in software-defined networks: new attacks and countermeasures,” in Proceedings of the Network and Distributed System Security Symposium, Internet Society, San Diego, Calif, USA, February 2015. View at Publisher · View at Google Scholar
  13. Open Networking Foundation, “OpenFlow Switch Specification,” version 1.4.0 (Wire Protocol 0x05), October 2013.
  14. “CacheBleed: A Timing Attack on OpenSSL Constant Time RSA[EB/OL],” 2016, https://ssrg.nicta.com.au/projects/TS/cachebleed/cachebleed.pdf.
  15. P. Porras, S. Cheung, M. Fong et al., “Securing the software-defined network control layer,” in Proceedings of the International Conference on Network and Distributed System Security Symposium, San Diego, Calif, USA, February 2015.
  16. S. Scott-Hayward and C. Kane, “OperationCheckpoint: SDN application control,” in Proceedings of International Conference on Network Protocols, pp. 618–623, Research Triangle Park, NC, USA, October 2014.
  17. S. Shin, Y. Song, T. Lee et al., “Rosemary: a robust, secure, and high-performance network operating system,” in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS '14), pp. 78–89, Scottsdale, Ariz, USA, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. Coverity, 2008–2016, http://www.coverity.com/.
  19. D. Song, D. Brumley, H. Yin et al., “BitBlaze: a new approach to computer security via binary analysis,” in Information Systems Security, vol. 5352 of Lecture Notes in Computer Science, pp. 1–25, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  20. M. Howard, “Fending off future attacks by reducing attack surface,” 2003, https://msdn.microsoft.com/en-us/library/ms972812.aspx.
  21. P. K. Manadhata and J. M. Wing, “A formal model for a SysTEm’s attack surface,” in Moving Target Defense, pp. 1–28, Springer, New York, NY, USA, 2011. View at Google Scholar
  22. M. M. Wang, J. W. Liu, J. Chen, J. Mao, and K. F. Mao, “Software defined networking: security model, threats and mechanism,” Journal of Software, vol. 27, no. 4, pp. 969–992, 2016 (Chinese). View at Google Scholar · View at MathSciNet
  23. R. Khondoker, A. Zaalouk, R. Marx, and K. Bayarou, “Feature-based comparison and selection of Software Defined Networking (SDN) controllers,” in Proceedings of the World Congress on Computer Applications and Information Systems (WCCAIS '14), January 2014. View at Publisher · View at Google Scholar · View at Scopus