Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018 (2018), Article ID 4123736, 10 pages
https://doi.org/10.1155/2018/4123736
Research Article

Security Analysis of Dynamic SDN Architectures Based on Game Theory

National Digital Switching System Engineering & Technological R&D Center, Zhengzhou, Henan 450002, China

Correspondence should be addressed to Chao Qi; moc.361@07174173931

Received 26 September 2017; Accepted 26 December 2017; Published 23 January 2018

Academic Editor: Zhiping Cai

Copyright © 2018 Chao Qi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. McKeown, T. Anderson, H. Balakrishnan et al., “OpenFlow: enabling innovation in campus networks,” Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008. View at Publisher · View at Google Scholar
  2. D. He, S. Chan, and M. Guizani, “Securing software defined wireless networks,” IEEE Communications Magazine, vol. 54, no. 1, pp. 20–25, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. C. Monsanto, J. Reich, and N. Foster, “Composing software-defined networks,” in Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation, pp. 1–14, USENIX Association, 2013.
  4. Z. Guo, M. Su, Y. Xu et al., “Improving the performance of load balancing in software-defined networks through load variance-based synchronization,” Computer Networks, vol. 68, pp. 95–109, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. P. Berde, M. Gerola, J. Hart et al., “ONOS: towards an open, distributed SDN OS,” in Proceedings of the 3rd ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking (HotSDN '14), pp. 1–6, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. V. Yazici, M. O. Sunay, and A. O. Ercan, “Controlling a software defined network via distributed controllers,” in Proceedings of the 2012 NEM Summit, pp. 16–20, 2014.
  7. H. Li, P. Li, S. Guo, and A. Nayak, “Byzantine-resilient secure software-defined networks with multiple controllers in cloud,” IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 436–447, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. X. Jin, J. Gossels, J. Rexford, and D. Walker, “CoVisor: a compositional hypervisor for software-defined networks,” in Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15), pp. 87–101, USENIX Association, May 2015. View at Scopus
  9. C. Qi, J. Wu, H. Hu et al., “An intensive security architecture with multi-controller for SDN,” in Proceedings of the 35th IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS '16), pp. 401-402, April 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. K. ElDefrawy and T. Kaczmarek, “Byzantine fault tolerant software-defined networking (SDN) controllers,” in Proceedings of the 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC '16), pp. 208–213, June 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Prakash and M. P. Wellman, “Empirical game-theoretic analysis for moving target defense,” in Proceedings of the 2nd ACM Workshop on Moving Target Defense (MTD '15), pp. 57–65, 2015. View at Publisher · View at Google Scholar · View at Scopus
  12. P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, “A security enforcement kernel for OpenFlow networks,” in Proceedings of the 1st ACM International Workshop on Hot Topics in Software Defined Networks (HotSDN '12), pp. 121–126, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, “Securing the Software Defined Network Control Layer,” in Proceedings of the Network and Distributed System Security Symposium (NDSS '15), San Diego, CA, USA, 2015. View at Publisher · View at Google Scholar
  14. Z. Guo, Y. Xu, M. Cello et al., “JumpFlow: Reducing flow table usage in software-defined networks,” Computer Networks, vol. 92, pp. 300–315, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. P. K. Manadhata and J. M. Wing, “An attack surface metric,” IEEE Transactions on Software Engineering, vol. 37, no. 3, pp. 371–386, 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. N. Poolsappasit, R. Dewri, and I. Ray, “Dynamic security risk management using Bayesian attack graphs,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 1, pp. 61–74, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. C.-C. Ten, C.-C. Liu, and M. Govindarasu, “Vulnerability assessment of cybersecurity for SCADA systems using attack trees,” in Proceedings of the IEEE Power Engineering Society General Meeting (PES '07), pp. 1–8, Tampa, FL, USA, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Jajodia, A. K. Ghosh, and V. Swarup, Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Springer Ebooks, 2011.
  19. S. Jajodia, S. K. Ghosh, V. S. Subrahmanian, V. Swarup, C. Wang, and X. S. Wang, Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Advances in Information Security, Springer, 2012.
  20. M. H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J.-P. Hubaux, “Game theory meets network security and privacy,” ACM Computing Surveys, vol. 45, no. 3, article 25, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Van Dijk, A. Juels, A. Oprea, and R. L. Rivest, “FlipIt: The game of "stealthy takeover",” Journal of Cryptology, vol. 26, no. 4, pp. 655–713, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Laszka, G. Horvath, M. Felegyhazi, and L. Buttyán, “FlipThem: modeling targeted attacks with flipit for multiple resources,” in Decision and Game Theory for Security, vol. 8840 of Lecture Notes in Computer Science, pp. 175–194, Springer International Publishing, Cham, 2014. View at Publisher · View at Google Scholar
  23. FloodLight, “Open SDN controller,” http://floodlight.openflowhub.org.
  24. “Ryu SDN Framework,” http://osrg.github.io/ryu.
  25. “OpenDaylight Consortium,” http://www.opendaylight.org.
  26. C. Qi, J. Wu, H. Hu, and G. Cheng, “Dynamic-scheduling mechanism of controllers based on security policy in software-defined network,” IEEE Electronics Letters, vol. 52, no. 23, pp. 1918–1920, 2016. View at Publisher · View at Google Scholar · View at Scopus