Skip to main content

A Security Policy Transition Framework for Software-Defined Networks

  • Chapter
  • First Online:
Guide to Security in SDN and NFV

Abstract

Software-defined networking (SDN) controllers are quickly maturing to offer greater abstractions and more intuitive programming for network operators seeking to develop their own network applications. Likewise, security-based research within the SDN community is a growing field with SDN-based security solutions becoming an ever-growing commodity. Yet, while these solutions often detect and block clients who violate network policies, they frequently fail to consider how policy enforcements will be revoked or updated once the flagged client addresses the violation for which they were flagged. As a result, no clear path exists for a client’s re-instantiation to the network beyond having the network operator manually remove the policy enforcement or reset the SDN controller. For the network operator, such requirements are tedious and error prone. Additionally, these efforts cost valuable time that could be better utilized for more complex network tasks. Hence, this chapter discusses a security policy transition framework for reducing wait times and automating the revocation of policy enforcements in SDN environments for clients who are approved to rejoin the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 69.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This chapter only considers a single controller, though distributed, logically centralized controllers can be used for more robust control options (e.g., fault tolerance, scalability, etc.).

  2. 2.

    Hash tables (Python dictionaries) are Ryuretic’s method for directing network operations.

References

  1. McKeown N (2009) Software-defined networking. INFOCOM Keynote Talk 17(2):30–32

    Google Scholar 

  2. McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Turner J (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69–74

    Google Scholar 

  3. Reich J, Monsanto C, Foster N, Rexford J, Walker D (2013) Modular SDN programming with pyretic. Technical report of USENIX

    Google Scholar 

  4. Cox JH Jr, Donovan S, Clark R, Owen H (2016) Ryuretic: a modular framework for RYU. In: IEEE MILCOM2016

    Google Scholar 

  5. Kim H, Benson T, Akella A, Feamster N (2011) The evolution of network configuration: a tale of two campuses. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, Nov 2011. ACM, pp 499–514

    Google Scholar 

  6. Kim H, Reich J, Gupta A, Shahbaz M, Feamster N, Clark R (2015) Kinetic: verifiable dynamic network control. In: 12th USENIX symposium on networked systems design and implementation (NSDI 15), pp 59–72

    Google Scholar 

  7. Tsagkaris et al (2015) Customizable autonomic network management: integrating autonomic network management and software-defined networking. IEEE Veh Technol Mag 10(1):61–68

    Google Scholar 

  8. Cox JH Jr, Clark RJ, Owen HL (2016) Security transition framework for software defined networks. In: Proceedings of the 2016 IEEE the first international workshop on security in NFV-SDN (SNS2016), Nov 2016. IEEE

    Google Scholar 

  9. Cisco, Network management system: best practices white paper. http://www.cisco.com/c/en/us/support/docs/availability/high-availability/15114-NMS-bestpractice.html

  10. Congdon P, Aboba B, Smith A, Zorn G, Roese J (2003) IEEE 802.1 X remote authentication dial in user service (RADIUS) usage guidelines (No. RFC 3580)

    Google Scholar 

  11. ForeScout. https://www.forescout.com/solutions/use-cases/network-access-control/

  12. Cisco NAC. http://www.cisco.com/c/en/us/products/collateral/security/nac-appliance-clean-access/product_data_sheet0900aecd802da1b5.html

  13. Wilkins S (2015) A guide to network access control (NAC) solutions, May 2015. http://www.tomsitpro.com/articles/network-access-control-solutions,2-916-2.html

  14. Skip Al, A bridge too far: defeating wired 802.1X with a transparent bridge using Linux. https://www.defcon.org/images/defcon-19/dc-19-presentations/Duckwall/DEFCON-19-Duckwall-Bridge-Too-Far.pdf

  15. Bari MF, Chowdhury SR, Ahmed R, Boutaba R (2013) PolicyCop: an autonomic QoS policy enforcement framework for software defined networks. In: 2013 IEEE SDN for future networks and services (SDN4FNS), Nov 2013. IEEE, pp 1–7

    Google Scholar 

  16. Casado M, Freedman MJ, Pettit J, Luo J, McKeown N, Shenker S (2007) Ethane: taking control of the enterprise. In: ACM SIGCOMM computer communication review, vol 37, no 4, Aug 2017. ACM, pp 1–12

    Google Scholar 

  17. Matias J, Garay J, Mendiola A, Toledo N, Jacob E (2014) FlowNAC: flow-based network access control. In: 2014 third European workshop on software defined networks, Sep 2014. IEEE, pp 79–84

    Google Scholar 

  18. POX. http://www.noxrepo.org/pox/about-pox/

  19. Ryu. http://osrg.github.io/ryu/

  20. Lighttpd. https://www.lighttpd.net/

  21. Lantz B, Heller B, McKeown N (2010) A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM workshop on hot topics in networks, Oct 2010. ACM, p 19

    Google Scholar 

  22. Cox JH Jr, Ryuretic security policy transition project. https://github.com/Ryuretic/SecRev

  23. Phaal P (2003) Detecting NAT devices using sFlow. http://www.sflow.org/detectNAT

  24. Cox JH Jr, Ryuretic rogue access point detection. https://github.com/Ryuretic/RAP

  25. Trusted Computing Group. https://trustedcomputinggroup.org/work-groups/trusted-network-communications/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jacob H. Cox Jr. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Cox, J.H., Clark, R.J., Owen, H.L. (2017). A Security Policy Transition Framework for Software-Defined Networks. In: Zhu, S., Scott-Hayward, S., Jacquin, L., Hill, R. (eds) Guide to Security in SDN and NFV. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-64653-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64653-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64652-7

  • Online ISBN: 978-3-319-64653-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics