首页 | 官方网站   微博 | 高级检索  
     

面向OpenFlow网络的访问控制规则自动实施方案
引用本文:刘艺,张红旗,代向东,雷程.面向OpenFlow网络的访问控制规则自动实施方案[J].计算机应用,2015,35(11):3270-3274.
作者姓名:刘艺  张红旗  代向东  雷程
作者单位:1. 信息工程大学, 郑州 450001;2. 河南省信息安全重点实验室, 郑州 450001
基金项目:国家863计划项目(2012AA012704); 郑州市科技领军人才项目(131PLJRC644).
摘    要:针对OpenFlow网络数据平面频繁改变导致网络难以实时满足访问控制策略要求的问题,提出了面向OpenFlow网络的访问控制规则自动实施方案.首先,由实时构建的转发路径获得可达空间,并通过规则集动态合成算法消除访问控制规则间的冲突;之后,采用规则空间分割算法将合成后访问控制规则的拒绝空间与可达空间比较,以检测直接和间接违反访问控制规则的非法转发路径;在此基础上,结合网络更新事件与违反检测结果灵活采取自动的违反解决方法,包括规则更新拒绝、规则序列移除、基于线性规划(LP)的近源端规则部署和末端规则部署4种;最后转换访问控制规则形式.理论分析和仿真结果表明,方案可用于控制器上运行多个安全应用程序和交换机内存受限的情况,并且基于LP的近源端规则部署方法可以降低网络中的不期望流量.

关 键 词:转发路径    线性规划    网络数据平面    访问控制规则    OpenFlow网络
收稿时间:2015-05-29
修稿时间:2015-07-02

Automatic implementation scheme of implementing access control rules in OpenFlow network
LIU Yi,ZHANG Hongqi,DAI Xiangdong,LEI Cheng.Automatic implementation scheme of implementing access control rules in OpenFlow network[J].journal of Computer Applications,2015,35(11):3270-3274.
Authors:LIU Yi  ZHANG Hongqi  DAI Xiangdong  LEI Cheng
Affiliation:1. Information Engineering University, Zhengzhou Henan 450001, China;2. Henan Key Laboratory of Information Security, Zhengzhou Henan 450001, China
Abstract:Focusing on the issue that OpenFlow network can't meet access control policy constantly resulted from its data plane changing frequently, an automatic implementation scheme of implementing access control rules in OpenFlow network was proposed. Firstly, reachable space was obtained by building real-time forwarding paths, and conflicts among access control rules were resolved by using dynamical synthesis algorithm. Then, denied space was extracted from synthetic set of access control rules by using rule space division algorithm, which was compared with reachable space subsequently to detect direct and indirect violations. According to network update situations and violation detection results, automatic violation resolutions were adopted flexibly, such as rejecting rule update, removing rule sequence, deploying rule near source based on Linear Programming (LP) and deploying rule terminally. Lastly, the format of access control rule was converted. The theoretical analysis and simulation results demonstrate that the proposed scheme is applicable under the condition that multiple security applications are running on the controller and memory of switch is limited, and show that deploying rule near source based on LP can minimize unwanted traffic of network.
Keywords:forwarding path                                                                                                                        Linear Programming (LP)                                                                                                                        network data plane                                                                                                                        access control rule                                                                                                                        OpenFlow network
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号