detection using supervised machine learning
techniques have proven to be highly
effective (Watson et al., 2016). For example, a
training set with negative labels for strings containing
ill-formatted strings could report a SQL injection as
an invalid request. Another possibility is to avoid the
verification and directly transform the input into a
‘safe’ one through the string analysis. In this case, the
request can be sanitized in order to be consistent
(Alkhalaf, 2014).
Checking the C2 Property. In order to avoid the
DoS attacks, many approaches have been proposed as
well (Zargar et al., 2013). Depending on the type of
an application that processes the request, different
approaches have been proven to be effective. In our
studies, the majority of virtualization platform
orchestrators are implemented in any form of a web
service or web application. For that reason, such
platforms are susceptible to a number of DoS
including the attacks that exploit slow
request/response or fragmentation attacks. One
possibility to avoid these threats is to make use of
anomaly detection methods applied to the users’
behavior.
We note that the properties of types A-C
described above form just a small subset of the issues
that can appear in user requests. However, the
scalable solutions discussed above can be applied to
other types of inconsistencies.
4 CONCLUSIONS
In this paper, we addressed the problem of the
verification and validation of user requests for
systems providing network services.
We discussed the possibilities of checking three
types of request issues, namely functional/logical
issues, resource allocation or parameter dependency
issues, and finally security issues. We also proposed
a number of scalable techniques for solving the
problems listed above and illustrated these techniques
by a number of examples of user requests.
As for the future work, we first plan to implement
the proposed request-validator solution and then
perform experimental evaluation in order to prove its
effectiveness. As one of existing platforms providing
virtual networks and service function chains has been
developed in our previous works, we plan to use it as
a case study.
Finally, we plan to study other non-functional
issues that can be added to the verification/validation
process of the user request.
ACKNOWLEDGEMENTS
The results in this work were partially funded by the
Celtic-Plus European project SENDATE, ID
C2015/3-1; French National project CARP (FUI 19);
Bilateral contracts with Orange Labs; Russian
Science Foundation (RSF), project № 16-49-03012.
REFERENCES
European Telecommunications Standards Institute (ETSI),
2013. Network Functions Virtualisation (NFV); Use
Cases, NFV-MAN V1.1.1, ETSI Standard.
Mechtri, M., Benyahia, I. G., Zeghlache, D., 2016. Agile
service manager for 5G, in the proceedings of the
IEEE/IFIP Network Operations and Management
Symposium (NOMS), Istanbul, Turkey, pp. 1285-1290.
Nadeau, T., Quinn, P., 2015. Problem Statement for Service
Function Chaining, Internet Engineering Task Force
(IETF) Request for Comments (RFC) 7498.
Palma, D., Rutkowski, M., Spatzier, T, 2016. TOSCA
Simple Profile in YAML Version 1.0. OASIS
Committee Specification 01.
Huang, P., Bolosky, W. J., Singh, A., Zhou, Y., 2015.
ConfValley: a systematic configuration validation
framework for cloud services, in the proceedings of the
Tenth European Conference on Computer Systems
(EuroSys '15). New York, USA, pp. 19:1-19:16.
Watson, M. R., Shirazi, N.-u.-h., Marnerides, A. K.,
Mauthe, A., Hutchison, D., 2016. Malware Detection in
Cloud Computing Infrastructures, IEEE Transactions
on Dependable and Secure Computing, vol. 13, no. 2,
pp. 192–205.
Zargar, S. T., Joshi, J. Tipper, D., 2013. A Survey of
Defense Mechanisms Against Distributed Denial of
Service (DDoS) Flooding Attacks, IEEE
Communications Surveys & Tutorials, vol. 15, no. 4,
pp. 2046-2069.
Idrees, M. S., Ayed, S., Cuppens-Boulahia, N. and
Cuppens, F., 2015. Dynamic Security Policies
Enforcement and Adaptation Using Aspects, in the
preceedings of the IEEE Trustcom/BigDataSE/ISPA,
pp. 1374-1379.
Alkhalaf, M. A., 2014. Automatic Detection and Repair of
Input Validation and Sanitization Bugs. PhD thesis,
University of California, Santa Barbara.