4.3 Article

Resilient backup controller placement in distributed SDN under critical targeted attacks

出版社

ELSEVIER
DOI: 10.1016/j.ijcip.2021.100422

关键词

-

资金

  1. Spanish Ministerio de Economia y Competitividad through the consolidated research group (CSI) [SGR1469]
  2. COST Action Resilient communication services protecting end user applications from disasterbased failures RECODIS) - COST (European Cooperation in Science and Technology) [CA15127]
  3. National Science Centre, Poland [2017/25/B/ST7/02313]
  4. POB Research Centre Cybersecurity and Data Science of Warsaw University of Technology within the Excellence Initiative ProgramResearch University (IDUB)

向作者/读者索取更多资源

This paper introduces an optimization approach to help SDN network operators properly locate controllers by considering predictable sets of critical targeted attacks, in order to protect network infrastructures.
Today, telecommunication networks are crucial infrastructures, as has, for example, been demonstrated by the COVID-19 crisis. Thus, protecting such infrastructures, including software-defined based networks (SDN), is of the utmost importance for network providers to assure society has constant access to reliable services. Targeted attacks on SDN can seriously affect their connectivity and thus service continuity. Such an attack, launched on network nodes, divides the network into disjoint components and, since the number of SDN controllers is limited, results in isolating a significant proportion of nodes from the (surviving) controllers, causing major disruptions in service availability. In this paper, we present an optimization approach which can be used by the SDN network operator to properly locate the controllers by taking into account predictable sets of critical targeted attacks on network topology. The proposed approach includes an algorithm for predicting, on the basis of appropriately defined attack effectiveness measures, the sets of most dangerous attacks. Such sets are then used as input data for controller placement optimization, which is performed by means of mixed-integer programming methods. In the optimization, the impact of the considered attacks is measured by a novel network availability measure. To minimize the consequences of attacks we consider additional backup controllers. Finally, we present results of a numerical study based on the introduced approach that illustrate the effectiveness of our approach. (C) 2021 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据