Skip to main content

Analysis of SDN Attack and Defense Strategy Based on Zero-Sum Game

  • Conference paper
  • First Online:
Advances in Brain Inspired Cognitive Systems (BICS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11691))

Included in the following conference series:

Abstract

Software Defined Network is a huge innovation in the field of computer networks. This technology implements software to control forwarding routing packets. The SDN controller can realize the use of the control plane, to manage various virtual exchange forwarding devices, thereby saving a lot of money, and shortening the development test cycle of SDN. However, with the advent of SDN-related network equipment, security issues have become an important factor constraining its development. This paper designs and simulates an SDN packet sampling strategy, using zero-sum game and analyzing the security of multiple SDN topology networks. The SDN packet sampling problem is modeled as a zero-sum security game, in which both attackers and defenders participate, and the importance of each point is quantified into the income value. The income of the attackers and defenders are determined according to the income value. Under the knowledge of incomes of attack and defense, we determine the SDN topology with the highest security performance and security defense strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, C., Cui, Y., Tang, W., Wu, J.: Research progress in Software Defined Network (SDN). J. Softw. (2015)

    Google Scholar 

  2. Zhang, W.: Depth Analysis SDN, Benefits, Strategy, Technology, Practice. Publishing House of Electronics Industry, Beijing (2014). ISBN 978-7-121-21821-7

    Google Scholar 

  3. Jain, S., Kumar, A., Mandal, S., et a1.: B4: experience with a globally-deployed software defined WAN. In: Association for Computing Machinery’s Special Interest Group on Data Communications, vol. 43, no. 4, pp. 3–14 (2013)

    Google Scholar 

  4. Cimorelli, F., Priscoli, F.D., Pietrabissa, A., et al.: A distributed load balancing algorithm for the control plane in software defined networking. In: Proceedings of 24th Mediterranean Conference on Control and Automation, pp. 1033–1040. IEEE (2016)

    Google Scholar 

  5. Zhang, W., Wang, X., Zhang, S., Huang, M.: SDN data packet sampling strategy based on security game. J. Zhengzhou Univ. (Sci. Ed.) 50(01), 15–19 (2018)

    Google Scholar 

  6. Gao, P., et al.: Analysis and realization of snort-based intrusion detection system. J. Comput. Appl. Softw. 23(8), 134–135 (2006)

    Google Scholar 

  7. Jiang, J., et al.: Live: an integrated production and feedback system for intelligent and interactive tv broadcasting. IEEE Trans. Broadcast. 57(3), 646–661 (2011)

    Article  Google Scholar 

  8. Zhou, H.: Zero-sum game and H_∞ control for discrete random singular systems. J. Nanchang Univ. (Sci. Technol.) 41(06), 519–523 (2017)

    Google Scholar 

  9. Meng, F., Lan, J., Hu, Y.: Bandwidth allocation strategy of data center backbone based on cooperative game. Comput. Res. Dev. 53(06), 1306–1313 (2016)

    Google Scholar 

  10. Wang, X., et al.: TKRD: trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis. Math. Biosci. Eng. 16(4), 2650–2667 (2019)

    Article  MathSciNet  Google Scholar 

  11. Feng, W., Huang, W., Ren, J.: Class imbalance ensemble learning based on margin theory. Appl. Sci. 8(5), 815(2018)

    Google Scholar 

  12. Sun, G., Ma, P., et al.: A stability constrained adaptive alpha for gravitational search algorithm. Knowl.-Based Syst. 139, 200–213 (2018)

    Article  Google Scholar 

  13. Feng, M., et al.: Big data analytics and mining for effective visualization and trends forecast-ing of crime data. IEEE Access 7, 106111–106123 (2019)

    Article  Google Scholar 

  14. Zhao, H., et al.: Compressive sensing based secret signals recovery for effective image Steganalysis in secure communications. Multimedia Tools Appl. 78(20), 29381–29394 (2019)

    Article  Google Scholar 

  15. Wang, Z., et al.: A deep-learning based feature hybrid framework for spatiotemporal saliency detection inside videos. Neurocomputing 287, 68–83 (2018)

    Article  Google Scholar 

Download references

Acknowledgment

This research is supported by Special project for research and development in key areas of Guangdong Province (2019B010121001), Guangdong Provincial Department of Education Innovation Project (2016KTSCX078) and Science & Technology Projects of Guangdong Province (2018a070717021).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, R., Lin, J., Liu, L., Ye, M., Wei, S. (2020). Analysis of SDN Attack and Defense Strategy Based on Zero-Sum Game. In: Ren, J., et al. Advances in Brain Inspired Cognitive Systems. BICS 2019. Lecture Notes in Computer Science(), vol 11691. Springer, Cham. https://doi.org/10.1007/978-3-030-39431-8_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-39431-8_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-39430-1

  • Online ISBN: 978-3-030-39431-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics