Abstract
Software Defined Network is a huge innovation in the field of computer networks. This technology implements software to control forwarding routing packets. The SDN controller can realize the use of the control plane, to manage various virtual exchange forwarding devices, thereby saving a lot of money, and shortening the development test cycle of SDN. However, with the advent of SDN-related network equipment, security issues have become an important factor constraining its development. This paper designs and simulates an SDN packet sampling strategy, using zero-sum game and analyzing the security of multiple SDN topology networks. The SDN packet sampling problem is modeled as a zero-sum security game, in which both attackers and defenders participate, and the importance of each point is quantified into the income value. The income of the attackers and defenders are determined according to the income value. Under the knowledge of incomes of attack and defense, we determine the SDN topology with the highest security performance and security defense strategy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, C., Cui, Y., Tang, W., Wu, J.: Research progress in Software Defined Network (SDN). J. Softw. (2015)
Zhang, W.: Depth Analysis SDN, Benefits, Strategy, Technology, Practice. Publishing House of Electronics Industry, Beijing (2014). ISBN 978-7-121-21821-7
Jain, S., Kumar, A., Mandal, S., et a1.: B4: experience with a globally-deployed software defined WAN. In: Association for Computing Machinery’s Special Interest Group on Data Communications, vol. 43, no. 4, pp. 3–14 (2013)
Cimorelli, F., Priscoli, F.D., Pietrabissa, A., et al.: A distributed load balancing algorithm for the control plane in software defined networking. In: Proceedings of 24th Mediterranean Conference on Control and Automation, pp. 1033–1040. IEEE (2016)
Zhang, W., Wang, X., Zhang, S., Huang, M.: SDN data packet sampling strategy based on security game. J. Zhengzhou Univ. (Sci. Ed.) 50(01), 15–19 (2018)
Gao, P., et al.: Analysis and realization of snort-based intrusion detection system. J. Comput. Appl. Softw. 23(8), 134–135 (2006)
Jiang, J., et al.: Live: an integrated production and feedback system for intelligent and interactive tv broadcasting. IEEE Trans. Broadcast. 57(3), 646–661 (2011)
Zhou, H.: Zero-sum game and H_∞ control for discrete random singular systems. J. Nanchang Univ. (Sci. Technol.) 41(06), 519–523 (2017)
Meng, F., Lan, J., Hu, Y.: Bandwidth allocation strategy of data center backbone based on cooperative game. Comput. Res. Dev. 53(06), 1306–1313 (2016)
Wang, X., et al.: TKRD: trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis. Math. Biosci. Eng. 16(4), 2650–2667 (2019)
Feng, W., Huang, W., Ren, J.: Class imbalance ensemble learning based on margin theory. Appl. Sci. 8(5), 815(2018)
Sun, G., Ma, P., et al.: A stability constrained adaptive alpha for gravitational search algorithm. Knowl.-Based Syst. 139, 200–213 (2018)
Feng, M., et al.: Big data analytics and mining for effective visualization and trends forecast-ing of crime data. IEEE Access 7, 106111–106123 (2019)
Zhao, H., et al.: Compressive sensing based secret signals recovery for effective image Steganalysis in secure communications. Multimedia Tools Appl. 78(20), 29381–29394 (2019)
Wang, Z., et al.: A deep-learning based feature hybrid framework for spatiotemporal saliency detection inside videos. Neurocomputing 287, 68–83 (2018)
Acknowledgment
This research is supported by Special project for research and development in key areas of Guangdong Province (2019B010121001), Guangdong Provincial Department of Education Innovation Project (2016KTSCX078) and Science & Technology Projects of Guangdong Province (2018a070717021).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, R., Lin, J., Liu, L., Ye, M., Wei, S. (2020). Analysis of SDN Attack and Defense Strategy Based on Zero-Sum Game. In: Ren, J., et al. Advances in Brain Inspired Cognitive Systems. BICS 2019. Lecture Notes in Computer Science(), vol 11691. Springer, Cham. https://doi.org/10.1007/978-3-030-39431-8_46
Download citation
DOI: https://doi.org/10.1007/978-3-030-39431-8_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39430-1
Online ISBN: 978-3-030-39431-8
eBook Packages: Computer ScienceComputer Science (R0)