An overview of security challenges in communication networks

The ongoing transition towards a networked society requires reliable and secure network infrastructure and services. As networks evolve from simple point to point systems towards complex, software-defined, ultra-high capacity and reach, and distributed cloud environments, new security challenges emerge. The EU-funded RECODIS project aims at coordinating and fostering research collaboration in Europe on disaster resiliency in communication networks. One of the disaster types, considered by RECODIS Working Group (WG) 4, are deliberate human-made attacks aimed at gaining unauthorized access to the network or disrupting the service. In order to develop methods for increasing network security in the presence of attacks, it is crucial to first identify the security vulnerabilities and attack methods that exploit them, as well as the capabilities and shortcomings of existing security schemes. To this end, the members of RECODIS WG4 performed a comprehensive overview of attack methods and security approaches from the literature. This overview covers the security vulnerabilities inherent to the underlying physical layer, the implications of software-defined networking to security, and security challenges in cloud networks spanning geographically distributed data centers.

[1]  J. Koenderink Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.

[2]  F. Richard Yu,et al.  Distributed denial of service attacks in software-defined networking with cloud computing , 2015, IEEE Communications Magazine.

[3]  Ozan K. Tonguz,et al.  Failure location algorithm for transparent optical networks , 2005, IEEE Journal on Selected Areas in Communications.

[4]  Biswanath Mukherjee,et al.  Minimizing the Risk From Disaster Failures in Optical Backbone Networks , 2014, Journal of Lightwave Technology.

[5]  Marília Curado,et al.  A Research Agenda for Benchmarking the Resilience of Software Defined Networks , 2014, 2014 IEEE International Symposium on Software Reliability Engineering Workshops.

[6]  Mark S. Leeson,et al.  Fault and attack management in all-optical networks , 2006, IEEE Communications Magazine.

[7]  Biswanath Mukherjee,et al.  Network adaptability to disaster disruptions by exploiting degraded-service tolerance , 2014, IEEE Communications Magazine.

[8]  Lena Wosinska,et al.  Attack-Aware Dedicated Path Protection in Optical Networks , 2016, Journal of Lightwave Technology.

[9]  Haralambos Mouratidis,et al.  Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts , 2014, Comput. Stand. Interfaces.

[10]  Jing Zhu,et al.  Attack-Aware Service Provisioning to Enhance Physical-Layer Security in Multi-Domain EONs , 2016, Journal of Lightwave Technology.

[12]  Bernhard Plattner,et al.  Network anomaly detection in the cloud: The challenges of virtual service migration , 2014, 2014 IEEE International Conference on Communications (ICC).

[13]  Ryan Shea,et al.  Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis , 2013, IEEE Systems Journal.

[14]  Song Guo,et al.  Byzantine-Resilient Secure Software-Defined Networks with Multiple Controllers in Cloud , 2014, IEEE Transactions on Cloud Computing.

[15]  Muriel Medard,et al.  Security issues in all-optical networks , 1997 .

[16]  Sherali Zeadally,et al.  Critical infrastructure protection: Requirements and challenges for the 21st century , 2015, Int. J. Crit. Infrastructure Prot..

[17]  Qi-feng Liu,et al.  Electromagnetic pulse threats to electronic information system and corresponding protection measures , 2011 .

[18]  Sakir Sezer,et al.  Queen ' s University Belfast-Research Portal Are We Ready for SDN ? Implementation Challenges for Software-Defined Networks , 2016 .

[19]  Pablo Pavón-Mariño,et al.  Wavelength assignment for reducing in-band crosstalk attack propagation in optical networks: ILP formulations and heuristic algorithms , 2012, Eur. J. Oper. Res..

[20]  Marija Furdek,et al.  Physical-layer attacks in all-optical WDM networks , 2011, 2011 Proceedings of the 34th International Convention MIPRO.

[21]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[22]  Viren Pereira,et al.  EMP (Electro-Magnetic Pulse) weapon technology along with EMP shielding & detection methodology , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[23]  Reuven Cohen,et al.  Coping with physical attacks on random network structures , 2013, 2014 IEEE International Conference on Communications (ICC).

[24]  Reza Curtmola,et al.  Mitigating Byzantine Attacks in Ad Hoc Wireless Networks , 2004 .

[25]  Lena Wosinska,et al.  A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment , 2010, IEEE/ACM Transactions on Networking.

[26]  Colin R. Miller Electromagnetic Pulse Threats in 2010 , 2013 .

[27]  Gil Zussman,et al.  The resilience of WDM networks to probabilistic geographical failures , 2011, INFOCOM 2011.

[28]  A. Takada,et al.  Security in Photonic Networks: Threats and Security Enhancement , 2011, Journal of Lightwave Technology.

[29]  Joel C. Willemssen CRITICAL INFRASTRUCTURE PROTECTION Comments on the Proposed Cyber Security Information Act of 2000 Statement of , 2000 .

[30]  Basil S. Maglaris,et al.  Leveraging SDN for Efficient Anomaly Detection and Mitigation on Legacy Networks , 2014, 2014 Third European Workshop on Software Defined Networks.

[31]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[32]  Paul R. Prucnal,et al.  Optical Layer Security in Fiber-Optic Networks , 2011, IEEE Transactions on Information Forensics and Security.

[33]  Shoba Krishnan,et al.  Security Issues in All-Optical Networks , 2011, 2011 Annual SRII Global Conference.