Securing of software defined network controllers
First Claim
Patent Images
1. A method of detecting security attacks and securing a software defined network, said method comprising:
- utilizing at least one processor to execute computer code configured to perform the steps of;
generating a representative global network state and a plurality of network constraints, wherein the representative global network state identifies representative traffic flow paths and traffic volume of the software defined network;
intercepting one or more control messages;
extracting information from the one or more control messages to create a current global network state, wherein the current global network state identifies current traffic flow paths and traffic volume of the software defined network;
determining, from the extracted information, presence of at least one modification to the software defined network, wherein the determining comprises validating the current global network state against the representative global network state and plurality of network constraints and identifying at least one change between the representative traffic flow paths and traffic volume of the software defined network and current traffic flow paths and traffic volume of the software defined network; and
thereupon determining whether the at least one modification presents a threat to security of the software defined network.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and arrangements for securing a software defined network. One or more control messages are intercepted. Information is extracted from the one or more control messages to create a global network state model, and there is determined, from the extracted information, presence of at least one prospective modification to the global network state model. Thereupon, a determination is made as to whether the at least one prospective modification presents a threat to security of the software defined network. Other variants and embodiments are broadly contemplated herein.
-
Citations
20 Claims
-
1. A method of detecting security attacks and securing a software defined network, said method comprising:
-
utilizing at least one processor to execute computer code configured to perform the steps of; generating a representative global network state and a plurality of network constraints, wherein the representative global network state identifies representative traffic flow paths and traffic volume of the software defined network; intercepting one or more control messages; extracting information from the one or more control messages to create a current global network state, wherein the current global network state identifies current traffic flow paths and traffic volume of the software defined network; determining, from the extracted information, presence of at least one modification to the software defined network, wherein the determining comprises validating the current global network state against the representative global network state and plurality of network constraints and identifying at least one change between the representative traffic flow paths and traffic volume of the software defined network and current traffic flow paths and traffic volume of the software defined network; and thereupon determining whether the at least one modification presents a threat to security of the software defined network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for detecting security attacks and securing a software defined network, said apparatus comprising:
-
at least one processor; and a computer readable storage medium having computer readable program code embodied therewith and executable by the at least one processor, the computer readable program code comprising; computer readable program code configured to generate a representative global network state and a plurality of network constraints, wherein the representative global network state identifies representative traffic flow paths and traffic volume of the software defined network; computer readable program code configured to intercept one or more control messages; computer readable program code configured to extract information from the one or more control messages to create a current global network state, wherein the current global network state identifies current traffic flow paths and traffic volume of the software defined network; computer readable program code configured to determine, from the extracted information, presence of at least one modification to the software defined network, wherein the code configured to determine comprises code that validates the current global network state against the representative global network state and plurality of network constraints and code that identifies at least one change between the representative traffic flow paths and traffic volume of the software defined network and current traffic flow paths and traffic volume of the software defined network; and computer readable program code configured to thereupon determine whether the at least one modification presents a threat to security of the software defined network.
-
-
17. A computer program product for detecting security attacks and securing a software defined network, said computer program product comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising; computer readable program code configured to generate a representative global network state and a plurality of network constraints, wherein the representative global network state identifies representative traffic flow paths and traffic volume of the software defined network; computer readable program code configured to intercept one or more control messages; computer readable program code configured to extract information from the one or more control messages to create a current global network state, wherein the current global network state identifies current traffic flow paths and traffic volume of the software defined network; computer readable program code configured to determine, from the extracted information, presence of at least one modification to the software defined network, wherein the code configured to determine comprises code that validates the current global network state against the representative global network state and plurality of network constraints and code that identifies at least one change between the representative traffic flow paths and traffic volume of the software defined network and current traffic flow paths and traffic volume of the software defined network; and computer readable program code configured to thereupon determine whether the at least one modification presents a threat to security of the software defined network. - View Dependent Claims (18, 19)
-
-
20. A method comprising:
-
defining a representative global network state and a plurality of network constraints, wherein the representative global network state identifies representative traffic flow paths and traffic volume of a software defined network; intercepting one or more control messages flowing to one or more network controllers, the one or more control messages comprising one or more control messages determined to be relevant to security of the software defined network; extracting information from the one or more control messages to create a current global network state, wherein the current global network state identifies current traffic flow paths and traffic volume of the software defined network; and determining whether at least one modification to the global network state model presents a threat to security of the software defined network, via; recording a deviation from the representative global network state, wherein the recording comprises validating the current global network state against the representative global network state and plurality of network constraints and identifying at least one change between the representative traffic flow paths and traffic volume of the software defined network and current traffic flow paths and traffic volume of the software defined network; and thereupon generating an alert.
-
Specification