to evaluate the status and performance of the
network and respond smartly. This information
includes the type of attack, location, elements under
the attack… For that reason, a link between a cyber-
physical IDS and the recovery module must be
created.
With all these inputs, TOWER proposes a
network topology that is able to tackle the malicious
attack isolating it and minimizing its impact in the
whole network as the consequence of the cascading
failure produced by the attack. The multilayer model
is basic to capture all the dependencies among the
different elements in the critical infrastructure,
enabling us to analyze the interdependencies that
may emerge from the network elements and the risk
analysis performed over them. It is important to note
that TOWER will not propose a unique network
topology but a ranked list of different topologies
ordered by a certain score metric. The final choice of
the topology will depend on the metric that the user
prefers to be optimized and in addition this list
provide different options for the rest of the recovery
module. It is of paramount importance to take into
account that the network topology the TOWER
proposes depends on the type of attack detected, as
different types of attacks can spread differently in
the network. This can be easily understood by means
of two examples. On the one hand, for a DDoS
attack TOWER will propose a network topology
where the paths under attack and traffic are cut and
traffic is rerouted to other backup paths. On the
other hand, if a server is compromised, the network
topology proposed by TOWER will isolate that
server and limit the communications made by all the
nodes that could have been reached from that server,
so pivoting attacks that employ accessible servers to
reach the internal network, that could not be attacked
otherwise, are also covered by the TOWER analysis.
Another important challenge of TOWER
consists in avoiding, or at least minimizing, the
possibility of exposing the network to new or even
worse weaknesses in the network topology proposed
by TOWER. The complex relations and
dependencies between nodes of the critical
infrastructure can be represented through different
metrics that let us to analyze the status of the
network and, at the same time, to compute how to
react to a malicious attack. Examples of such metrics
are: Wiener index, graph density, clustering
coefficient, degree centrality, hub and authority
centrality (Chakrabarti, 1999), PageRank centrality
(Brin, 1998), Katz centrality (Katz, 1953) or
betweenness centrality (Koschützki, 2005).
6 CONCLUSIONS
This paper focused on the preliminary design (i.e.,
functional specifications and architectural blocks) of
the RECOVER subsystem, in the SCOUT project,
according to the emerging SDN approach. Proposing
the introduction of SDN in satellite networks, and,
more specifically in their control segment, represents
a big challenge and outstanding innovation that are
being addressed by SCOUT. In most cases, satellite
networks are very static infrastructures, deployed for
specific purposes and vendor locked-in.
Programmability, agility, manageability and open
standards adoption, which are basic features of SDN,
are essential ingredients to speed up the evolution of
satellite networks and to deliver new services to end
users.
More specifically, in this case SDN is the ground
for building a satellite infrastructure resilient to
physical and cyber-attacks: according to the
proposed architecture, the RECOVER subsystem is
provided with a traffic control application that
enables security routing and packet filtering by
leveraging an SDN control platform.
RECOVER subsystem architecture is going to
adopt a hybrid SDN model by using a centralized
Controller implemented by using the
OpenFlow standard protocol configuring each
network device's flow table.
ACKNOWLEDGEMENTS
This work has been carried out in the framework of
the EU FP7 SCOUT project (GA Number: 607019).
REFERENCES
ONF, Software-Defined Networking: The New Norm for
Networks”, ONF White Paper, 2012.
Nunes, B.A.A., et al. A Survey of Software-Defined
Networking: Past, Present, and Future of
Programmable Networks”, IEEE Communications
Surveys and Tutorials, vol. 16, no. 3, pp. 1617-1634,
2014.
Lara, A., et al. Network Innovation using OpenFlow: A
Survey”, IEEE Communications Surveys and
Tutorials, vol. 16, no. 1, pp. 493-512, 2013.
McKeown, N., et al. OpenFlow: Enabling Innovation in
Campus Networks”, ACM SIGCOMM Computer
Communication Review, vol. 38, no. 2, pp. 69-74,
2008.