OperationCheckpoint: SDN Application Control

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Citations (Scopus)
768 Downloads (Pure)

Abstract

One of the core properties of Software Defined Networking (SDN) is the ability for third parties to develop network applications. This introduces increased potential for innovation in networking from performance-enhanced to energy-efficient designs. In SDN, the application connects with the network via the SDN controller. A specific concern relating to this communication channel is whether an application can be trusted or not. For example, what information about the network state is gathered by the application? Is this information necessary for the application to execute or is it gathered for malicious intent? In this paper we present an approach to secure the northbound interface by introducing a permissions system that ensures that controller operations are available to trusted applications only. Implementation of this permissions system with our Operation Checkpoint adds negligible overhead and illustrates successful defense against unauthorized control function access attempts.
Original languageEnglish
Title of host publicationThe 22nd IEEE International Conference on Network Protocols (ICNP 2014)
Pages618-623
Number of pages6
DOIs
Publication statusPublished - Oct 2014
EventIEEE International Conference on Network Protocols (ICNP) - North Carolina, Raleigh, United States
Duration: 21 Oct 201424 Oct 2014

Conference

ConferenceIEEE International Conference on Network Protocols (ICNP)
CountryUnited States
CityRaleigh
Period21/10/201424/10/2014

Fingerprint Dive into the research topics of 'OperationCheckpoint: SDN Application Control'. Together they form a unique fingerprint.

  • Cite this

    Scott-Hayward, S., Kane, C., & Sezer, S. (2014). OperationCheckpoint: SDN Application Control. In The 22nd IEEE International Conference on Network Protocols (ICNP 2014) (pp. 618-623) https://doi.org/10.1109/ICNP.2014.98