当前位置:网站首页>SDN specific network security issues
SDN specific network security issues
2022-06-09 22:16:00 【InfoQ】
One 、SDN Security of the architecture
- Because the network security equipment and the protected nodes 、 Physical connections between networks are no longer used , Therefore, an attacker can bypass the security mechanism required by the security policy through stream redirection .
- Attackers can eavesdrop on traditional networks 、 worm 、 Malicious code and other methods , steal SDN The network administrator's account and password enter the controller , Illegal operation , Implement network attacks .
- Exploit the security vulnerability or open interface of the controller , The attacker injects or issues wrong instructions , Request to change the application system , The sent request parameters are inconsistent with the business logic , The implementation of DoS attack .
- An attacker listens on an insecure open interface , Steal sensitive data or modify packet contents , You can also use man in the middle attacks , Replay or modify data request .
- If the application interface does not adopt a security check mechanism , It is easy to be exploited by attackers , Send a large number of useless flow tables to network devices , trigger DDoS attack .
Two 、 The security of the data plane
- confidentiality: Ensure that the data of the transport layer will not be eavesdropped or leaked .
- Message integrity: Ensure that the data of the transport layer will not be tampered with or replaced .
- Identification: Verify the identity of both communication parties through public key certificate , Helps prevent fraudulent controller activity , And deceptive streams initiated by attackers in network devices .
3、 ... and 、 The safety of the control plane
- DDoS Attack protection: A highly available controller architecture can reduce DDoS The impact of the attack . To achieve this goal , First, we should strengthen our understanding of DDoS Research on attack detection methods , Second, research is taking place DDoS Then how to use redundant controllers to make up for the failure of controllers .
- Access control: Research on access control technology of controller , There are mainly role-based access control (RBAC)、 Property based access control (ABAC) etc. .
- Malicious code protection: Virus against controller 、 worm 、 Trojan horse and other protection technologies .
- Network security devices: Firewall for controller 、IDS And IPS、 Network audit and forensics .
Four 、 The security of application plane
边栏推荐
- C语言试题163之计算某一天是对应年的第几天,这一年一共多少天;计算两个日期之间相隔的天数。两个日期由键盘输入。
- What are the advantages of realizing enterprise digital transformation with odoo?
- Calculation method that can be used for NLP Task Evaluation (semantic similarity calculation)
- 邦纳雷达传感器Q120RAQ-CN-AF19719
- Alternative scheme for electric energy acquisition terminal of Langer ffc3 watt hour meter (DLMS infrared photoelectric collector)
- 工业互联网+危化安全生产数字化综合管理云平台
- Lidar related introduction
- Digital engineering construction enterprises carry out "safety production month" activities in this way
- The fourth paradigm chenyuqiang: the next generation technology of enterprise intelligent decision-making "reinforcement learning + environmental learning"
- 【翻译论文】A Progressive Morphological Filter for Removing Nonground Measurements From Airborne LIDAR Dat
猜你喜欢

Début de la production de sécurité et prévention et contrôle des épidémies

86. (leaflet house) leaflet military plotting - collection of linear arrows

The 14th Sudoku - true Sudoku - day 5-20220120

MATLAB实现Pettitt突变检验

Spider PI intelligent vision hexapod robot patrol function 0603

Thread pool

ST-Link V2 下载出现:internal command error&Error: Flash Download failed - Target DLL has been cancelled

华为设备配置Hub and Spoke

St link V2 Download: internal command error & error: flash download failed - target DLL has been canceled

spider pi 智能视觉六足机器人 颜色识别功能 0603
随机推荐
线程池的学习记录
Unity get the content information of XML file
浅谈倍增法求解LCA
[translation paper] a progressive morphological filter for removing nonground measurements from airport lidar dat
FPN-Feature Pyramid Network
与鲲鹏代码迁移工具的初次邂逅
Unity code binding button function
AVL树的旋转
An RS485 serial interface current sensor snap on type mutual inductor supports Modbus communication protocol
202206007 Simulation Competition summary
建筑工地数字化监管和科学战疫的智慧力量
PostgreSQL近期常用的錶結構查詢語句
FPN-Feature Pyramid Network
数字化工程施工企业这样开展“安全生产月”活动
First encounter with Kunpeng code migration tool
河北恒银期货是正规平台吗?安全吗?
Digital supervision of construction sites and the wisdom of scientific warfare
spider pi 智能视觉六足机器人 颜色识别功能 0603
在 4GB 物理内存的机器上,申请 8G 内存会怎么样?
调查显示macOS应用开发者普遍表示产品如何被用户发现是他们最大的挑战