Vulnerabilities of network OS and mitigation with state-based permission system

Cited 9 time in webofscience Cited 0 time in scopus
  • Hit : 1320
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorNoh, Jiseongko
dc.contributor.authorLee, Seunghyeonko
dc.contributor.authorPark, Jaehyunko
dc.contributor.authorShin, Seungwonko
dc.contributor.authorKang, Brent Byunghoonko
dc.date.accessioned2016-10-04T07:00:49Z-
dc.date.available2016-10-04T07:00:49Z-
dc.date.created2015-12-24-
dc.date.created2015-12-24-
dc.date.issued2016-09-
dc.identifier.citationSECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982-
dc.identifier.issn1939-0114-
dc.identifier.urihttp://hdl.handle.net/10203/213023-
dc.description.abstractThe advancement of software defined networking (SDN) is redefining traditional computer networking architecture. The role of the control plane of SDN is of such importance that SDNs are referred to as network operating systems (OSs). However, the robustness and security of the network OS has been overlooked. In this paper, we report three main issues pertaining to network OSs. First, we identified vulnerabilities that could be exploited by malicious or buggy applications running on network OSs. We also identified four major attack vectors that could undermine network OS operations: denial of service, global data manipulation, control plane poisoning, and system shell execution. Further, it was demonstrated that real-world attacks can be launched on commonly used network OSs without significant effort. Second, we present a method to address the attacks by analyzing network applications running on network OSs to identify their behavioral features, which enabled the extraction of a permission set for each network application. Based on this work, a permission-based malicious network application detector was introduced, which examines the permission set of each application and prevents it from executing without permission. Our system shows almost no performance overhead. Copyright (c) 2015 John Wiley Sons, Ltd.-
dc.languageEnglish-
dc.publisherWILEY-BLACKWELL-
dc.titleVulnerabilities of network OS and mitigation with state-based permission system-
dc.typeArticle-
dc.identifier.wosid000380728100008-
dc.identifier.scopusid2-s2.0-84949515126-
dc.type.rimsART-
dc.citation.volume9-
dc.citation.issue13-
dc.citation.beginningpage1971-
dc.citation.endingpage1982-
dc.citation.publicationnameSECURITY AND COMMUNICATION NETWORKS-
dc.identifier.doi10.1002/sec.1369-
dc.contributor.localauthorShin, Seungwon-
dc.contributor.localauthorKang, Brent Byunghoon-
dc.type.journalArticleArticle-
dc.subject.keywordAuthornetwork security-
dc.subject.keywordAuthorsoftware defined networking-
dc.subject.keywordAuthornetwork operating system-
Appears in Collection
EE-Journal Papers(저널논문)CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 9 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0