One of the core properties of Software Defined Networking (SDN) is the ability for third parties to develop network applications. This introduces increased potential for innovation in networking from performance-enhanced to energy-efficient designs. In SDN, the application connects with the network via the SDN controller. A specific concern relating to this communication channel is whether an application can be trusted or not. For example, what information about the network state is gathered by the application? Is this information necessary for the application to execute or is it gathered for malicious intent? In this paper we present an approach to secure the northbound interface by introducing a permissions system that ensures that controller operations are available to trusted applications only. Implementation of this permissions system with our Operation Checkpoint adds negligible overhead and illustrates successful defense against unauthorized control function access attempts.
|Title of host publication||The 22nd IEEE International Conference on Network Protocols (ICNP 2014)|
|Number of pages||6|
|Publication status||Published - Oct 2014|
|Event||IEEE International Conference on Network Protocols (ICNP) - North Carolina, Raleigh, United States|
Duration: 21 Oct 2014 → 24 Oct 2014
|Conference||IEEE International Conference on Network Protocols (ICNP)|
|Period||21/10/2014 → 24/10/2014|