计算机应用 ›› 2015, Vol. 35 ›› Issue (12): 3429-3436.DOI: 10.11772/j.issn.1001-9081.2015.12.3429

• 信息安全 • 上一篇    下一篇

面向软件定义网络的入侵容忍控制器架构及实现

黄亮1,2, 姜帆1,2, 荀浩1,2, 马多贺1,2, 王利明1,2   

  1. 1. 中国科学院信息工程研究所, 北京 100093;
    2. 信息安全国家重点实验室, 北京 100093
  • 收稿日期:2015-05-25 修回日期:2015-07-26 出版日期:2015-12-10 发布日期:2015-12-10
  • 通讯作者: 姜帆(1991-),女,湖南长沙人,硕士研究生,主要研究方向:网络安全
  • 作者简介:黄亮(1982-),男,河北隆化人,助理研究员,硕士,主要研究方向:网络安全、软件定义网络;荀浩(1990-),男,山西霍州人,助理工程师,CCF会员,主要研究方向:网络安全、软件定义网络;马多贺(1982-),男,安徽六安人,助理研究员,博士,CCF会员,主要研究方向:网络与系统安全;王利明(1978-),男,内蒙古赤峰人,副研究员,博士,CCF会员,主要研究方向:下一代互联网、可信网络。
  • 基金资助:
    中国科学院信息工程研究所所内创新项目(Y4Z0034102)。

Software-defined networking-oriented intrusion tolerance controller architecture and its implementation

HUANG Liang1,2, JIANG Fan1,2, XUN Hao1,2, MA Duohe1,2, WANG Liming1,2   

  1. 1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;
    2. State Key Laboratory of Information Security, Beijing 100093, China
  • Received:2015-05-25 Revised:2015-07-26 Online:2015-12-10 Published:2015-12-10

摘要: 针对软件定义网络(SDN)这一集中式网络控制环境中控制平面存在单点失效问题,提出一种基于入侵容忍思想的控制器架构,通过冗余、多样的中央控制器平台来提高网络可用性与可靠性。该架构利用一种控制器消息的比对方法来检测被入侵的控制器。首先,规定了需比对的关键消息类型和字段;其次,运用一致性裁决算法对不同控制器消息进行比对;最后,将消息异常的控制器进行网络隔离并重启恢复。基于Mininet的入侵容忍可靠性测试表明,该入侵容忍控制器架构可检测并过滤异常控制器消息。基于Mininet的控制器响应延迟测试表明,当容忍度设置为1和3时,下层网络请求延时分别增加16%和42%。基于Cbench的控制器响应延迟和吞吐量测试表明,该入侵容忍控制器性能处在各个子控制器(Ryu,Floodlight)性能水平之间,且向性能高的子控制器趋近。在实际应用中,可根据应用场景的安全级别配置子控制器的数量和类型,以满足对响应速度和入侵容忍度的要求。

关键词: 软件定义网络, 入侵容忍, 控制器, 一致性检测, 消息比对

Abstract: In the centralized network control environment of Software-Defined Network (SDN), the problem of a single point of failure exists in the controlling plane. In order to solve the problem, a kind of controller architecture was proposed based on intrusion tolerance ideology to improve the availability and reliability of network by using the redundant and diverse central controller platform. In the proposed architecture, the intruded controllers were detected by comparing their messages. Firstly, the key message types and fields needing to be compared were defined. Then, different controller messages were compared using a consistency judgement algorithm. Finally, the controllers with abnormal messages would be isolated and restored. The Mininet-based intrusion tolerance reliability test demonstrated that the controller architecture based on intrusion tolerance could detect and filter the abnormal controller messages. The Mininet-based response-delay test showed that the requirement-delay of underlying network increased by 16% and 42% while the tolerance degree was 1 and 3 respectively. In addition, the Cbench-based response-delay and throughput tests showed that the performance of the intrusion tolerance controller lay among the subsidiary controllers, such as Ryu and Floodlight, and approached the advanced one. In practical application, the quantity and type of the subsidiary controllers can be configured according to the security level of application scenarios, and the proposed intrusion tolerance controller can satisfy the application requirements of response rate and intrusion tolerance degree.

Key words: Software-Defined Network (SDN), intrusion tolerance, controller, consistency test, comparison message

中图分类号: