557
views
0
recommends
+1 Recommend
1 collections
    8
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      BLOSTER: Blockchain-based System for Detection of Fraudulent Rules in Software-Defined Networks

      proceedings-article

      , , , , ,

      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)

      Cyber Security Research

      10th-12th September 2019

      Blockchain, Software-Defined Network, OpenFlow

      Bookmark

            Abstract

            This work proposes BLOSTER, a lightweight and accurate detection system, which leverages the blockchain technology to detect any tampering attempt with the OpenFlow rules of the software-defined networks. We test BLOSTER on an experimental platform combining blockchain and software-defined networking technologies. Security analysis and performance results demonstrate that BLOSTER ensures full detection of fraudulent rules within short detection time.

            Content

            Author and article information

            Contributors
            Conference
            September 2019
            September 2019
            : 38-40
            Affiliations
            [0001]King Saud University

            Saudi Arabia
            [0002]USTHB University

            Algeria
            [0003]De Montfort University

            UK
            [0004]Guelma University

            Algeria
            [0005]Guangdong University of Petrochemical Technology

            China
            Article
            10.14236/ewic/icscsr19.5
            8ecebb98-248f-40e8-9c78-36e1d367675b
            © Abdelouahid Derhab et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            6th International Symposium for ICS & SCADA Cyber Security Research 2019
            ICS-CSR
            6
            Athens, Greece
            10th-12th September 2019
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            REFERENCES

            1. Software-defined networking: Asurvey, Computer Networks 81 7995 2015

            2. https://www.sdxcentral.com/sdn/definitions/what-is-openflow/

            3. Veriflow:Verifying network-wide invariants in real time, the 10th USENIX Symposium on Networked Systems Design andImplementation (NSDI) 2013 15 27

            4. A security enforcement kernel for OpenFlow networks Proceedings of the first workshop on Hot topics in software defined networks ACM 2012 121 126

            5. FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures Proceedings of the 3rd ACM workshop on Assurable and usable security configuration ACM 2010 37 44

            6. Blockchain technologies for the internet of things: Researchissues and challenges IEEE Internet of Things Journal 6 2 2188 2204 2019

            7. https://www.openstack.org/

            8. https://www.multichain.com/

            9. https://bitcoin.org/en/bitcoin-core/

            10. https://www.jsonrpc.org/specification

            11. https://www.opennetworking.org/onos/

            12. Authflow: authentication andaccess control mechanism for software defined networking, Annals of Telecommunications 71 11-12 607 615 2016

            Comments

            Comment on this article