Providing cyber resilience in software-defined networks by secure routing means

dc.citation.epage19
dc.citation.issue1
dc.citation.journalTitleІнфокомунікаційні технології та електронна інженерія
dc.citation.spage11
dc.contributor.affiliationХарківський національний університет радіоелектроніки
dc.contributor.affiliationKharkiv National University of Radio Electronics
dc.contributor.authorШхайтлі, А.
dc.contributor.authorПерсіков, М.
dc.contributor.authorChhaytli, A.
dc.contributor.authorPersikov, M.
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2023-03-03T11:09:24Z
dc.date.available2023-03-03T11:09:24Z
dc.date.created2021-04-01
dc.date.issued2021-04-01
dc.description.abstractУ статті вирішується технологічне завдання забезпечення кіберстійкості програмно-конфігурованих мереж (Software-Defined Networks, SDN) за допомогою засобів безпечної маршрутизації. У роботі проаналізовано архітектуру SDN та її основні компоненти, концепцію кіберстійкості та її засобів, а також питання безпеки в SDN. Особливу увагу звернено на використання безпечної маршрутизації у програмно-конфігурованих мережах. Здійснено числове дослідження моделі безпечної багатошляхової маршрутизації фрагментованих конфіденційних повідомлень у площині даних SDN. Виконано розрахунок імовірності компрометації повідомлення для різних значень імовірностей компрометації каналів зв’язку. Отримані результати показали, що модель безпечної багатошляхової маршрутизації фрагментованих конфіденційних повідомлень із надмірністю забезпечує кращу збалансованість частин повідомлень за маршрутами. Результати числового дослідження довели адекватність вибраної моделі безпечної багатошляхової маршрутизації.
dc.description.abstractThis paper is devoted to solving the technical task of providing cyber resilience utilizing secure routing means in Software-Defined Networks (SDN). The work analyzes the SDN architecture and its main components, the concept of cyber resilience and its means, as well as security issues in SDN. Particular attention is paid to the use of secure routing in software-defined networks. Numerical research of the model of secure multipath routing of fragmented confidential messages in the SDN data plane was conducted. The calculation of the message compromise probability for different values of links compromise probabilities was performed. The obtained results showed that the model of secure multipath routing of fragmented confidential messages with redundancy provides a better balancing of message parts by routes. Results of the numerical study proved the adequacy of the selected secure multipath routing model.
dc.format.extent11-19
dc.format.pages9
dc.identifier.citationChhaytli A. Providing cyber resilience in software-defined networks by secure routing means / A. Chhaytli, M. Persikov // Infocommunication Technologies and Electronic Engineering. — Lviv : Lviv Politechnic Publishing House — Vol 1. — No 1. — P. 11–19.
dc.identifier.citationenChhaytli A., Persikov M. Providing cyber resilience in software-defined networks by secure routing means. Infocommunication Technologies and Electronic Engineering (Lviv), vol. 1, no 1, pp. 11-19.
dc.identifier.issn2786-4553
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/57480
dc.language.isoen
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofІнфокомунікаційні технології та електронна інженерія, 1 (1)
dc.relation.ispartofInfocommunication Technologies and Electronic Engineering, 1 (1)
dc.relation.references[1] Linkov, I., and Kott, A. (2019), “Fundamental concepts of cyber resilience: Introduction and overview”, Cyber resilience of systems and networks, Springer, Cham, pp. 1–25.
dc.relation.references[2] Galinec, D., and Steingartner, W. (2017), “Combining cybersecurity and cyber defense to achieve cyber resilience”, 2017 IEEE 14th International Scientific Conference on Informatics, IEEE, pp. 87–93.
dc.relation.references[3] Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., and McQuaid, R. (2019), “Developing Cyber Resilient Systems: A Systems Security Engineering Approach” (No. NIST Special Publication (SP) 800–160 Vol. 2 (Draft)), National Institute of Standards and Technology.
dc.relation.references[4] Dickson, F., and Goodwin, P. (2019), “Five Key Technologies for Enabling a Cyber-Resilience Framework”, US45455119, IBM.
dc.relation.references[5] Musman, S. (2016), “Assessing prescriptive improvements to a system’s cyber security and resilience”, 2016 Annual IEEE Systems Conference (SysCon), IEEE, pp. 1–6.
dc.relation.references[6] Stallings, W. (2015), Foundations of modern networking: SDN, NFV, QoE, IoT, and Cloud. Addison-Wesley Professional.
dc.relation.references[7] Rangan, R. K. (2020), “Trends in SD-WAN and SDN”, CSI Transactions on ICT, vol. 8, no. 1, pp. 21–27.
dc.relation.references[8] Stallings, W. (2018), Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional.
dc.relation.references[9] Liu, Y., Zhao, B., Zhao, P., Fan, P., and Liu, H. (2019), “A survey: Typical security issues of software-defined networking”, China Communications, vol. 16, no. 7, pp. 13–31.
dc.relation.references[10] Porras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., and Gu, G. (2012), “A security enforcement kernel for OpenFlow networks”, Proceedings of the first workshop on Hot topics in software defined networks, pp. 121–126.
dc.relation.references[11] Yeremenko, O., Lemeshko, O., and Persikov, A. (2017), “Secure routing in reliable networks: proactive and reactive approach”, Conference on Computer Science and Information Technologies. Springer, Cham, pp. 631–655.
dc.relation.references[12] Patil, M. V., and Jadhav, V. (2017), “Secure, reliable and load balanced routing protocols for multihop wireless networks”, 2017 International Conference on Intelligent Computing and Control (I2C2), IEEE, pp. 1–6.
dc.relation.references[13] Li, J., Yang, Z., Yi, X., Hong, T., and Wang, X. (2018), “A Secure Routing Mechanism for Industrial Wireless Networks Based on SDN”, 2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), IEEE, pp. 158–164.
dc.relation.references[14] Sagare, A. A., and Khondoker, R. (2018), “Security Analysis of SDN Routing Applications”, SDN and NFV Security, Springer, Cham, pp. 1–17.
dc.relation.references[15] Francois, F., and Gelenbe, E. (2016), “Optimizing secure SDN-enabled inter-data centre overlay networks through cognitive routing”, 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE, pp. 283–288.
dc.relation.references[16] Lemeshko, O., Yeremenko, O., Shapovalova, A., Hailan, A. M., Yevdokymenko, M., and Persikov, M. (2021), “Design and Research of the Model for Secure Traffic Engineering Fast ReRoute under Traffic Policing Approach”, 2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), IEEE, pp. 23–26.
dc.relation.references[17] Lou, W., and Kwon, Y. (2006), “H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks”, IEEE Transactions on Vehicular Technology, 55(4), рр. 1320–1330.
dc.relation.references[18] Yeremenko, O. S., and Ali, A. S. (2015), “Secure multipath routing algorithm with optimal balancing message fragments in MANET”, Radioelectronics and Informatics. 2015. vol. 1, no. 68, pp. 26–29.
dc.relation.references[19] Лемешко О. В., Невзорова О. С., Єременко О. С., Євсєєва О. Ю. (2016), Методичні вказівки до практичних занять з дисципліни “Управління та маршрутизація в ТКС” для студентів денної форми навчання спеціальності 6.050903, Телекомунікації, Харків: ХНУРЕ.
dc.relation.references[20] Duffy, D. G. (2016), Advanced engineering mathematics with MATLAB®, Chapman and Hall/CRC.
dc.relation.referencesen[1] Linkov, I., and Kott, A. (2019), "Fundamental concepts of cyber resilience: Introduction and overview", Cyber resilience of systems and networks, Springer, Cham, pp. 1–25.
dc.relation.referencesen[2] Galinec, D., and Steingartner, W. (2017), "Combining cybersecurity and cyber defense to achieve cyber resilience", 2017 IEEE 14th International Scientific Conference on Informatics, IEEE, pp. 87–93.
dc.relation.referencesen[3] Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., and McQuaid, R. (2019), "Developing Cyber Resilient Systems: A Systems Security Engineering Approach" (No. NIST Special Publication (SP) 800–160 Vol. 2 (Draft)), National Institute of Standards and Technology.
dc.relation.referencesen[4] Dickson, F., and Goodwin, P. (2019), "Five Key Technologies for Enabling a Cyber-Resilience Framework", US45455119, IBM.
dc.relation.referencesen[5] Musman, S. (2016), "Assessing prescriptive improvements to a system’s cyber security and resilience", 2016 Annual IEEE Systems Conference (SysCon), IEEE, pp. 1–6.
dc.relation.referencesen[6] Stallings, W. (2015), Foundations of modern networking: SDN, NFV, QoE, IoT, and Cloud. Addison-Wesley Professional.
dc.relation.referencesen[7] Rangan, R. K. (2020), "Trends in SD-WAN and SDN", CSI Transactions on ICT, vol. 8, no. 1, pp. 21–27.
dc.relation.referencesen[8] Stallings, W. (2018), Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional.
dc.relation.referencesen[9] Liu, Y., Zhao, B., Zhao, P., Fan, P., and Liu, H. (2019), "A survey: Typical security issues of software-defined networking", China Communications, vol. 16, no. 7, pp. 13–31.
dc.relation.referencesen[10] Porras, P., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., and Gu, G. (2012), "A security enforcement kernel for OpenFlow networks", Proceedings of the first workshop on Hot topics in software defined networks, pp. 121–126.
dc.relation.referencesen[11] Yeremenko, O., Lemeshko, O., and Persikov, A. (2017), "Secure routing in reliable networks: proactive and reactive approach", Conference on Computer Science and Information Technologies. Springer, Cham, pp. 631–655.
dc.relation.referencesen[12] Patil, M. V., and Jadhav, V. (2017), "Secure, reliable and load balanced routing protocols for multihop wireless networks", 2017 International Conference on Intelligent Computing and Control (I2C2), IEEE, pp. 1–6.
dc.relation.referencesen[13] Li, J., Yang, Z., Yi, X., Hong, T., and Wang, X. (2018), "A Secure Routing Mechanism for Industrial Wireless Networks Based on SDN", 2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), IEEE, pp. 158–164.
dc.relation.referencesen[14] Sagare, A. A., and Khondoker, R. (2018), "Security Analysis of SDN Routing Applications", SDN and NFV Security, Springer, Cham, pp. 1–17.
dc.relation.referencesen[15] Francois, F., and Gelenbe, E. (2016), "Optimizing secure SDN-enabled inter-data centre overlay networks through cognitive routing", 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE, pp. 283–288.
dc.relation.referencesen[16] Lemeshko, O., Yeremenko, O., Shapovalova, A., Hailan, A. M., Yevdokymenko, M., and Persikov, M. (2021), "Design and Research of the Model for Secure Traffic Engineering Fast ReRoute under Traffic Policing Approach", 2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), IEEE, pp. 23–26.
dc.relation.referencesen[17] Lou, W., and Kwon, Y. (2006), "H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks", IEEE Transactions on Vehicular Technology, 55(4), rr. 1320–1330.
dc.relation.referencesen[18] Yeremenko, O. S., and Ali, A. S. (2015), "Secure multipath routing algorithm with optimal balancing message fragments in MANET", Radioelectronics and Informatics. 2015. vol. 1, no. 68, pp. 26–29.
dc.relation.referencesen[19] Lemeshko O. V., Nevzorova O. S., Yeremenko O. S., Yevsieieva O. Yu. (2016), Metodychni vkazivky do praktychnykh zaniat z dystsypliny "Upravlinnia ta marshrutyzatsiia v TKS" dlia studentiv dennoi formy navchannia spetsialnosti 6.050903, Telekomunikatsii, Kharkiv: KhNURE.
dc.relation.referencesen[20] Duffy, D. G. (2016), Advanced engineering mathematics with MATLAB®, Chapman and Hall/CRC.
dc.rights.holder© Національний університет „Львівська політехніка“, 2021
dc.subjectSDN
dc.subjectбезпечна маршрутизація
dc.subjectкіберстійкість
dc.subjectімовірність компрометації
dc.subjectмоделювання
dc.subjectSDN
dc.subjectSecure Routing
dc.subjectCyber Resilience
dc.subjectCompromise Probability
dc.subjectModeling
dc.subject.udc621.391
dc.titleProviding cyber resilience in software-defined networks by secure routing means
dc.title.alternativeЗабезпечення кіберстійкості програмно-конфігурованих мереж засобами безпечної маршрутизації
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
v1n1_Chhaytli_A-Providing_cyber_resilience_11-19.pdf
Size:
713.25 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.78 KB
Format:
Plain Text
Description: