ENHANCING SECURITY IN SOFTWARE-DEFINED NETWORKING THROUGH ROUTING TECHNIQUES EXPLORATION

Authors

DOI:

https://doi.org/10.20998/2079-0023.2023.01.02

Keywords:

SDN, CVSS, vulnerability, NFV, data plane, NVD, Software-Defined Networking

Abstract

In today's world, network security is a key issue of information security. Virtual Networks have become an integral part of modern IT infrastructure, which presents us with challenges in the field of security. One solution to this problem is the use of software-defined networking (SDN), which provides a means to control and manage network traffic. However, as with any technology, SDN has its vulnerabilities that must be considered when deploying it. One of the tools that helps to take into account the vulnerabilities of network infrastructure is the Common Vulnerability Scoring System (CVSS) standard. It allows you to quantify the level of vulnerability of the infrastructure, which enables effective network protection. Analysis of the CVSS standard is an important stage in the development of a network security strategy. This paper analyzes the standards for building software-configured networks. It is noted that SDN is a modern approach to the design, construction, and operation of information communication networks. Using SDN makes it possible to directly program and dynamically manage the network, as well as to abstract the functionality of the infrastructure layer. However, the growing interest in SDN has revealed the shortcomings of their application in the fight against cybersecurity threats. The SDN architecture itself, external malicious attacks, and insufficient access control and encryption tools were found to be the main security challenges. The use of secure routing tools based on vulnerability metrics is proposed to increase the level of SDN data plane network security. According to the conducted analysis of SDN data plane vulnerabilities and the functionality of routing tools, the authors recommend using the CVSS standard to quantify the level of infrastructure vulnerability during the development and research of promising approaches to secure routing in the data plane of software-configured networks.

Author Biographies

Andrii Levterov, Kharkiv National Automobile and Highway University

Candidate of Technical Sciences, Professor, Kharkiv National Automobile and Highway University, Head of the Department of Informatics and Applied Mathematics, Kharkiv, Ukraine

Hanna Pliekhova, Kharkiv National Automobile and Highway University

Candidate of Technical Sciences, Docent, Kharkiv National Automobile and Highway University, Associate Professor at the Department of Informatics and Applied Mathematics, Kharkiv, Ukraine

Maryna Kostikova, Kharkiv National Automobile and Highway University

Candidate of Technical Sciences, Docent, Kharkiv National Automobile and Highway University, Associate Professor at the Department of Informatics and Applied Mathematics, Kharkiv, Ukraine

Nataliia Berezhna, State Biotechnological University

Candidate of Technical Sciences, Docent, State Biotechnological University, Associate Professor at the Department of Transport Technologies and Logistics, Kharkiv, Ukraine

Anton Okun, National Technical University "Kharkiv Polytechnic Institute"

Candidate of Technical Sciences, Docent, National Technical University "Kharkiv Polytechnic Institute", Associate Professor at the Department of Computer Modeling and Integrated Forming Technologies, Kharkiv, Ukraine

References

Sabella A., Irons-Mclean R., Yannuzzi M. Orchestrating and automating security for the internet of things: Delivering advanced security capabilities from edge to cloud for IoT. Cisco Press, 2018, 1008 p.

Kurose J. F., Ross K. Computer networking. 8th Edition. Pearson, 2020. 775 p.

The Alliance for Telecommunications Industry Solutions (ATIS). URL: http://www.atis.org/ (accessed 03.05.2023).

The Broadband Forum Member (BBF). URL: https://www.broadband-forum.org/ (accessed 03.05.2023).

The European Telecommunications Standards Institute (ETSI). URL: http://www.etsi.org/technologies-clusters/technologies/nfv (accessed 03.05.2023).

The Institute of Electrical and Electronics Engineers (IEEE). URL: https://sdn.ieee.org (accessed 03.05.2023).

The International Council on Large Electrical Systems (CIGRE). URL: http://www.cigre.org/ (accessed 03.05.2023).

The International Telecommunication Union Telecommunication Standardization Sector (ITU-T). URL: http://www.itu.int/en/ITU-T/sdn/Pages/default.aspx (accessed 03.05.2023).

The Internet Engineering Taskforce (IETF). URL: https://ietf.org.

The Internet Research Task Force (IRTF). URL: https://irtf.org/concluded/sdnrg (accessed 03.05.2023).

The Internet Society (ISOC). URL: https://www.internetsociety.org/ (accessed 03.05.2023).

The Metro Ethernet Forum (MEF). URL: https://mef.net/ (accessed 03.05.2023).

The Open Data Centre Alliance (ODCA). URL: https://opendatacenteralliance.org/ (accessed 03.05.2023).

OpenDaylight. URL: https://www.opendaylight.org/ (accessed 03.05.2023).

The Open Networking Foundation (ONF). URL: https://www.opennetworking.org/ (accessed 03.05.2023).

The Open Platform for NFV (OPNFV). URL: https://www.opnfv.org.

The Optical Internetworking Forum (OIF). URL: http://www.oiforum.com/ (accessed 03.05.2023).

Liu Y., Zhao B., Zhao P., Fan P., Liu H. A survey: Typical security issues of software-defined networking. China Communications. 2019, vol. 16(7), pp. 13–31.

Sagare A. A., Khondoker R. Security analysis of SDN routing applications. SDN and NFV Security. Lecture Notes in Networks and Systems. Springer, Cham, 2018, vol. 30, pp. 1–17.

Yeremenko O., Persikov M., Lemeshko V., Altaki B. Research and development of the secure routing flow-based model with load balancing. Problemy telekomunikatsii [Telecommunication Problems]. 2021, no. 2(29), pp. 3–14.

Yevdokymenko M., Shapovalova A., Shapoval M. Potokova model marshrutyzatsii iz vrakhuvanniam ryzykiv informatsiinoi bezpeky za dopomohoiu bazovykh metryk krytychnosti vrazlyvostei [Flow model of routing taking into account information security risks using basic vulnerability criticality metrics]. Problemy telekomunikatsii [Telecommunication Problems]. 2020, no. 1(26), pp. 48–62.

Yevdokymenko M., Yeremenko O., Shapovalova A., Shapoval M., Porokhniak V., Rogovaya N. Investigation of the Secure Paths Set Calculation Approach Based on Vulnerability Assessment. Workshop Proceedings of the MoMLeT+DS 2021: 3rd International Workshop on Modern Machine Learning Technologies and Data Science, June 5, 2021, Lviv-Shatsk, Ukraine, pp. 207–217.

Stallings W. Effective Cybersecurity: Understanding and using standards and best practices. Addison-Wesley, 2019. 800 p.

Common Vulnerability Scoring System v3.0: Examples, Forum of Incident Response and Security Teams. URL: https://www.first.org/cvss/examples (accessed 03.05.2023).

NIST National Vulnerability Database, URL: https://nvd.nist.gov (accessed 03.05.2023).

Published

2023-07-15

How to Cite

Levterov, A., Pliekhova, H., Kostikova, M., Berezhna, N., & Okun, A. (2023). ENHANCING SECURITY IN SOFTWARE-DEFINED NETWORKING THROUGH ROUTING TECHNIQUES EXPLORATION. Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, (1 (9), 10–18. https://doi.org/10.20998/2079-0023.2023.01.02

Issue

Section

SYSTEM ANALYSIS AND DECISION-MAKING THEORY