Information Security of SDN on the Basis of Meta Data

  • Alexander Grusho
  • Nick Grusho
  • Michael Zabezhailo
  • Alexander Zatsarinny
  • Elena Timonina
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10446)


Information security of SDN (Software Defined Network) is a part of support of information security in service-oriented architectures and clouds. These services can be presented in the form of tasks and the sets of subtasks and/or tasks represented by schedule diagrams of subtasks. Therefore it is necessary to consider the integrated information security system of such services.

The model of security of cloud computing on the basis of interaction between level of tasks and level of SDN is constructed. It is shown that meta data about solvable tasks can be used for effective control of information flows at a network and can reduce the level of network threats. The constructed protocols allow different strength of a security.


Information security Software Defined Network Meta data Hierarchical decomposition 



The research is supported by Russian Foundation for Basic Research (project 15-29-07981, project 15-07-02053).


  1. 1.
    Grusho, A.A., Abaev, P.O., Shorgin, S.Y., Timonina, E.E.: Graphs for information security control in software defined networks. In: AIP Conference Proceedings (2017). (to be published)Google Scholar
  2. 2.
    Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A.V., Imran, M.: Security in software-defined networking: threats and countermeasures. J. Mob. Netw. Appl. 21(5), 764–776 (2016). doi: 10.1007/s11036-016-0676-x CrossRefGoogle Scholar
  3. 3.
    Luo, S., Wu, J., Li, J., Guo, L., Pei, B.: Context-aware traffic forwarding service for applications in SDN. In: IEEE International Conference on Smart City/SocialCom/SustainCom, pp. 557–561. IEEE Press, New York (2015). doi: 10.1109/SmartCity. 2015.128
  4. 4.
    Fergusson, A.D., Guha, A., Liang, C., Fonseca, R., Krishnamurthi, S.: Hierarchical policies for software defined networks. In: HotSDN 2012, 13 August, Helsinki, pp. 37–41. ACM (2012). doi: 10.1145/2342441.2342450
  5. 5.
    Sokolov, V., Alekseev, I., Mazilov, D., Nikitinskiy, M.: A network analytics system in the SDN. In: SDN and NFV: The Next Generation of Computational Infrastructure: 2014 International Science and Technology Conference Modern Networking Technologies (MoNeTec), pp. 160–162. MAKS Press, Moscow (2014)Google Scholar
  6. 6.
    Pantuza, G., Sampaio, F., Viera, L., Guedes, D., Viera, M.: Network management through graphs in software defined network. In: 10th CNSM and Workshop, pp. 400–405. IFIP (2014)Google Scholar
  7. 7.
    McGeer, R.: A safe, efficient update protocol for OpenFlow networks. In: HotSDN 2012, August 13, Helsinki, pp. 61–66. ACM (2012)Google Scholar
  8. 8.
    Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A., Piskovski, V.O.: Secure automatic reconfiguration of cloudy computing. J. Syst. Means Inform. 26(3), 83–92 (2016). doi: 10.14357/08696527160306 Google Scholar
  9. 9.
    Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A.: On the advanced procedure to reduce calculation of Galois closures. J. Inform. Appl. 10(4), 97–106 (2016). doi: 10.14357/19922264160410 Google Scholar
  10. 10.
    Grusho, A.A., Zabezhailo, M.I., Zatsarinny, A.A.: Information flow monitoring and control in cloud computing environment. J. Inform. Appl. 9(4), 95–101 (2015). doi: 10.14357/1992264150410 Google Scholar
  11. 11.
    Grusho, A., Grusho, N., Piskovski, V., Timonina, E.: Five SDN-oriented directions in information security. In: SDN and NFV: The Next Generation of Computational Infrastructure: 2014 International Science and Technology Conference Modern Networking Technologies (MoNeTec), pp. 68–71. MAKS Press, Moscow (2014). doi: 10.1109/MoNeTeC.2014.6995586
  12. 12.
    Nilsson, N.J.: Problem-Solving Methods in Artificial Intelligence. McGraw-Hill Pub. Co., New York (1971)Google Scholar
  13. 13.
    Lazarev, A.A., Gafarov, E.R.: Scheduling Theory. Tasks and Algorithms. Publ. House MSU, Moscow (2011)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Institute of Informatics Problems of Federal Research Center“Informatics and Control” of the Russian Academy of SciencesMoscowRussia

Personalised recommendations