Providing cyber resilience in software-defined networks by secure routing means
dc.citation.epage | 19 | |
dc.citation.issue | 1 | |
dc.citation.journalTitle | Інфокомунікаційні технології та електронна інженерія | |
dc.citation.spage | 11 | |
dc.contributor.affiliation | Харківський національний університет радіоелектроніки | |
dc.contributor.affiliation | Kharkiv National University of Radio Electronics | |
dc.contributor.author | Шхайтлі, А. | |
dc.contributor.author | Персіков, М. | |
dc.contributor.author | Chhaytli, A. | |
dc.contributor.author | Persikov, M. | |
dc.coverage.placename | Львів | |
dc.coverage.placename | Lviv | |
dc.date.accessioned | 2023-03-03T11:09:24Z | |
dc.date.available | 2023-03-03T11:09:24Z | |
dc.date.created | 2021-04-01 | |
dc.date.issued | 2021-04-01 | |
dc.description.abstract | У статті вирішується технологічне завдання забезпечення кіберстійкості програмно-конфігурованих мереж (Software-Defined Networks, SDN) за допомогою засобів безпечної маршрутизації. У роботі проаналізовано архітектуру SDN та її основні компоненти, концепцію кіберстійкості та її засобів, а також питання безпеки в SDN. Особливу увагу звернено на використання безпечної маршрутизації у програмно-конфігурованих мережах. Здійснено числове дослідження моделі безпечної багатошляхової маршрутизації фрагментованих конфіденційних повідомлень у площині даних SDN. Виконано розрахунок імовірності компрометації повідомлення для різних значень імовірностей компрометації каналів зв’язку. Отримані результати показали, що модель безпечної багатошляхової маршрутизації фрагментованих конфіденційних повідомлень із надмірністю забезпечує кращу збалансованість частин повідомлень за маршрутами. Результати числового дослідження довели адекватність вибраної моделі безпечної багатошляхової маршрутизації. | |
dc.description.abstract | This paper is devoted to solving the technical task of providing cyber resilience utilizing secure routing means in Software-Defined Networks (SDN). The work analyzes the SDN architecture and its main components, the concept of cyber resilience and its means, as well as security issues in SDN. Particular attention is paid to the use of secure routing in software-defined networks. Numerical research of the model of secure multipath routing of fragmented confidential messages in the SDN data plane was conducted. The calculation of the message compromise probability for different values of links compromise probabilities was performed. The obtained results showed that the model of secure multipath routing of fragmented confidential messages with redundancy provides a better balancing of message parts by routes. Results of the numerical study proved the adequacy of the selected secure multipath routing model. | |
dc.format.extent | 11-19 | |
dc.format.pages | 9 | |
dc.identifier.citation | Chhaytli A. Providing cyber resilience in software-defined networks by secure routing means / A. Chhaytli, M. Persikov // Infocommunication Technologies and Electronic Engineering. — Lviv : Lviv Politechnic Publishing House — Vol 1. — No 1. — P. 11–19. | |
dc.identifier.citationen | Chhaytli A., Persikov M. Providing cyber resilience in software-defined networks by secure routing means. Infocommunication Technologies and Electronic Engineering (Lviv), vol. 1, no 1, pp. 11-19. | |
dc.identifier.issn | 2786-4553 | |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/57480 | |
dc.language.iso | en | |
dc.publisher | Видавництво Львівської політехніки | |
dc.publisher | Lviv Politechnic Publishing House | |
dc.relation.ispartof | Інфокомунікаційні технології та електронна інженерія, 1 (1) | |
dc.relation.ispartof | Infocommunication Technologies and Electronic Engineering, 1 (1) | |
dc.relation.references | [1] Linkov, I., and Kott, A. (2019), “Fundamental concepts of cyber resilience: Introduction and overview”, Cyber resilience of systems and networks, Springer, Cham, pp. 1–25. | |
dc.relation.references | [2] Galinec, D., and Steingartner, W. (2017), “Combining cybersecurity and cyber defense to achieve cyber resilience”, 2017 IEEE 14th International Scientific Conference on Informatics, IEEE, pp. 87–93. | |
dc.relation.references | [3] Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., and McQuaid, R. (2019), “Developing Cyber Resilient Systems: A Systems Security Engineering Approach” (No. NIST Special Publication (SP) 800–160 Vol. 2 (Draft)), National Institute of Standards and Technology. | |
dc.relation.references | [4] Dickson, F., and Goodwin, P. (2019), “Five Key Technologies for Enabling a Cyber-Resilience Framework”, US45455119, IBM. | |
dc.relation.references | [5] Musman, S. (2016), “Assessing prescriptive improvements to a system’s cyber security and resilience”, 2016 Annual IEEE Systems Conference (SysCon), IEEE, pp. 1–6. | |
dc.relation.references | [6] Stallings, W. (2015), Foundations of modern networking: SDN, NFV, QoE, IoT, and Cloud. Addison-Wesley Professional. | |
dc.relation.references | [7] Rangan, R. K. (2020), “Trends in SD-WAN and SDN”, CSI Transactions on ICT, vol. 8, no. 1, pp. 21–27. | |
dc.relation.references | [8] Stallings, W. (2018), Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional. | |
dc.relation.references | [9] Liu, Y., Zhao, B., Zhao, P., Fan, P., and Liu, H. (2019), “A survey: Typical security issues of software-defined networking”, China Communications, vol. 16, no. 7, pp. 13–31. | |
dc.relation.references | [10] Porras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., and Gu, G. (2012), “A security enforcement kernel for OpenFlow networks”, Proceedings of the first workshop on Hot topics in software defined networks, pp. 121–126. | |
dc.relation.references | [11] Yeremenko, O., Lemeshko, O., and Persikov, A. (2017), “Secure routing in reliable networks: proactive and reactive approach”, Conference on Computer Science and Information Technologies. Springer, Cham, pp. 631–655. | |
dc.relation.references | [12] Patil, M. V., and Jadhav, V. (2017), “Secure, reliable and load balanced routing protocols for multihop wireless networks”, 2017 International Conference on Intelligent Computing and Control (I2C2), IEEE, pp. 1–6. | |
dc.relation.references | [13] Li, J., Yang, Z., Yi, X., Hong, T., and Wang, X. (2018), “A Secure Routing Mechanism for Industrial Wireless Networks Based on SDN”, 2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), IEEE, pp. 158–164. | |
dc.relation.references | [14] Sagare, A. A., and Khondoker, R. (2018), “Security Analysis of SDN Routing Applications”, SDN and NFV Security, Springer, Cham, pp. 1–17. | |
dc.relation.references | [15] Francois, F., and Gelenbe, E. (2016), “Optimizing secure SDN-enabled inter-data centre overlay networks through cognitive routing”, 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE, pp. 283–288. | |
dc.relation.references | [16] Lemeshko, O., Yeremenko, O., Shapovalova, A., Hailan, A. M., Yevdokymenko, M., and Persikov, M. (2021), “Design and Research of the Model for Secure Traffic Engineering Fast ReRoute under Traffic Policing Approach”, 2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), IEEE, pp. 23–26. | |
dc.relation.references | [17] Lou, W., and Kwon, Y. (2006), “H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks”, IEEE Transactions on Vehicular Technology, 55(4), рр. 1320–1330. | |
dc.relation.references | [18] Yeremenko, O. S., and Ali, A. S. (2015), “Secure multipath routing algorithm with optimal balancing message fragments in MANET”, Radioelectronics and Informatics. 2015. vol. 1, no. 68, pp. 26–29. | |
dc.relation.references | [19] Лемешко О. В., Невзорова О. С., Єременко О. С., Євсєєва О. Ю. (2016), Методичні вказівки до практичних занять з дисципліни “Управління та маршрутизація в ТКС” для студентів денної форми навчання спеціальності 6.050903, Телекомунікації, Харків: ХНУРЕ. | |
dc.relation.references | [20] Duffy, D. G. (2016), Advanced engineering mathematics with MATLAB®, Chapman and Hall/CRC. | |
dc.relation.referencesen | [1] Linkov, I., and Kott, A. (2019), "Fundamental concepts of cyber resilience: Introduction and overview", Cyber resilience of systems and networks, Springer, Cham, pp. 1–25. | |
dc.relation.referencesen | [2] Galinec, D., and Steingartner, W. (2017), "Combining cybersecurity and cyber defense to achieve cyber resilience", 2017 IEEE 14th International Scientific Conference on Informatics, IEEE, pp. 87–93. | |
dc.relation.referencesen | [3] Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., and McQuaid, R. (2019), "Developing Cyber Resilient Systems: A Systems Security Engineering Approach" (No. NIST Special Publication (SP) 800–160 Vol. 2 (Draft)), National Institute of Standards and Technology. | |
dc.relation.referencesen | [4] Dickson, F., and Goodwin, P. (2019), "Five Key Technologies for Enabling a Cyber-Resilience Framework", US45455119, IBM. | |
dc.relation.referencesen | [5] Musman, S. (2016), "Assessing prescriptive improvements to a system’s cyber security and resilience", 2016 Annual IEEE Systems Conference (SysCon), IEEE, pp. 1–6. | |
dc.relation.referencesen | [6] Stallings, W. (2015), Foundations of modern networking: SDN, NFV, QoE, IoT, and Cloud. Addison-Wesley Professional. | |
dc.relation.referencesen | [7] Rangan, R. K. (2020), "Trends in SD-WAN and SDN", CSI Transactions on ICT, vol. 8, no. 1, pp. 21–27. | |
dc.relation.referencesen | [8] Stallings, W. (2018), Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional. | |
dc.relation.referencesen | [9] Liu, Y., Zhao, B., Zhao, P., Fan, P., and Liu, H. (2019), "A survey: Typical security issues of software-defined networking", China Communications, vol. 16, no. 7, pp. 13–31. | |
dc.relation.referencesen | [10] Porras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., and Gu, G. (2012), "A security enforcement kernel for OpenFlow networks", Proceedings of the first workshop on Hot topics in software defined networks, pp. 121–126. | |
dc.relation.referencesen | [11] Yeremenko, O., Lemeshko, O., and Persikov, A. (2017), "Secure routing in reliable networks: proactive and reactive approach", Conference on Computer Science and Information Technologies. Springer, Cham, pp. 631–655. | |
dc.relation.referencesen | [12] Patil, M. V., and Jadhav, V. (2017), "Secure, reliable and load balanced routing protocols for multihop wireless networks", 2017 International Conference on Intelligent Computing and Control (I2C2), IEEE, pp. 1–6. | |
dc.relation.referencesen | [13] Li, J., Yang, Z., Yi, X., Hong, T., and Wang, X. (2018), "A Secure Routing Mechanism for Industrial Wireless Networks Based on SDN", 2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), IEEE, pp. 158–164. | |
dc.relation.referencesen | [14] Sagare, A. A., and Khondoker, R. (2018), "Security Analysis of SDN Routing Applications", SDN and NFV Security, Springer, Cham, pp. 1–17. | |
dc.relation.referencesen | [15] Francois, F., and Gelenbe, E. (2016), "Optimizing secure SDN-enabled inter-data centre overlay networks through cognitive routing", 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE, pp. 283–288. | |
dc.relation.referencesen | [16] Lemeshko, O., Yeremenko, O., Shapovalova, A., Hailan, A. M., Yevdokymenko, M., and Persikov, M. (2021), "Design and Research of the Model for Secure Traffic Engineering Fast ReRoute under Traffic Policing Approach", 2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), IEEE, pp. 23–26. | |
dc.relation.referencesen | [17] Lou, W., and Kwon, Y. (2006), "H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks", IEEE Transactions on Vehicular Technology, 55(4), rr. 1320–1330. | |
dc.relation.referencesen | [18] Yeremenko, O. S., and Ali, A. S. (2015), "Secure multipath routing algorithm with optimal balancing message fragments in MANET", Radioelectronics and Informatics. 2015. vol. 1, no. 68, pp. 26–29. | |
dc.relation.referencesen | [19] Lemeshko O. V., Nevzorova O. S., Yeremenko O. S., Yevsieieva O. Yu. (2016), Metodychni vkazivky do praktychnykh zaniat z dystsypliny "Upravlinnia ta marshrutyzatsiia v TKS" dlia studentiv dennoi formy navchannia spetsialnosti 6.050903, Telekomunikatsii, Kharkiv: KhNURE. | |
dc.relation.referencesen | [20] Duffy, D. G. (2016), Advanced engineering mathematics with MATLAB®, Chapman and Hall/CRC. | |
dc.rights.holder | © Національний університет „Львівська політехніка“, 2021 | |
dc.subject | SDN | |
dc.subject | безпечна маршрутизація | |
dc.subject | кіберстійкість | |
dc.subject | імовірність компрометації | |
dc.subject | моделювання | |
dc.subject | SDN | |
dc.subject | Secure Routing | |
dc.subject | Cyber Resilience | |
dc.subject | Compromise Probability | |
dc.subject | Modeling | |
dc.subject.udc | 621.391 | |
dc.title | Providing cyber resilience in software-defined networks by secure routing means | |
dc.title.alternative | Забезпечення кіберстійкості програмно-конфігурованих мереж засобами безпечної маршрутизації | |
dc.type | Article |