small slump in second 15 which can be traced back to
the adaptation to the new path (cf. figure 5).
During the validation we identified open tasks re-
garding the implementation in terms of a productive
usage. Our prototype currently only supports the
object-oriented definition of rules. This is closely
aligned to the way our program conducts the feasi-
bility analysis. In the future, a more general approach
would improve implementations, e.g. by providing a
respective specified rule language. Furthermore, if a
playbook’s action is refused, it is currently not pos-
sible to configure alternative actions. Even though
it is possible to add additional playbooks for the
same incident-asset-classification combination, they
currently cannot be prioritized. In addition, whether
an alternative path can meet the time criteria of a
real-time link has to be determined by the controller
before the alternative path can be selected and sug-
gested to the SDE. This might then result in an SDE-
L2Switch negotiation to find alternative paths. How-
ever, currently our implementation is lacking the sup-
port of the real-time calculation (and thus the nego-
tiation). As part of the project FlexSi-Pro
5
we are
currently developing a solution for this issue using
Time-Sensitive Networking
6
. In section 3, we pro-
posed the strategy to mimic the classification of links
by classifying their respective flow entries. In pro-
duction, it would be more reasonable to have a ded-
icated link representation within the SDN database,
e.g. within the topology inventory, and adding classi-
fications there. This slightly increases the necessary
development effort and the complexity of determin-
ing the links, but separates the link configuration from
the currently available flow entries and therefore does
not require end-to-end flow entries being preconfig-
ured for every classified link. Thus, we are planning
to detach the link representations from flow entries.
We are currently addressing these open tasks in
the mentioned project FlexSi-Pro and will deploy and
further develop our prototype in our ICS test labora-
tory (Pfrang et al., 2016).
4 CONCLUSIONS
In this work, we described an SDN-based solution for
automated incident response in flexible ICS networks.
In contrast to previous research, our proposed solution
takes into account the multiple restrictions for auto-
mated incident response in an ICS, utilising restric-
tive rules and asset classification. A basic, adaptable
5
https://www.wibu.com/uk/flexsi-pro.html
6
http://www.ieee802.org/1/pages/tsn.html
set of such rules is described in this paper. Instead
of reinventing the wheel, we designed our solution to
be compliant with the already existing SDN4S con-
cept and built a prototype demonstrating the feasibil-
ity of the implementation of our approach on com-
mon SDN platforms. Based on this prototype, we
were able to evaluate our concept to identify remain-
ing issues and potential starting points for future re-
search. With this paper, we presented an enabler for
SDN-based incident response in environments which
have special restrictions, regarding incident response
actions affecting host, network components and com-
munication links.
REFERENCES
Bierman, A., Bjorklund, M., and Watsen, K. (2017). REST-
CONF Protocol. RFC 8040, RFC Editor. Last ac-
cessed on Dec, 2018.
Bjorklund, M. (2010). YANG - A Data Modeling Language
for the Network Configuration Protocol (NETCONF).
RFC 6020, RFC Editor. Last accessed on Dec, 2018.
Bromiley, M. (2017). The Show Must Go On! The 2017
SANS Incident Response Survey. Analyst paper,
SANS. Last accessed on Dec, 2018.
Cichonski, P., Millar, T., Grance, T., and Scarfone, K.
(2012). Computer Security Incident Handling Guide
: Recommendations of the National Institute of Stan-
dards and Technology. National Institute of Standards
and Technology.
Di Lallo, R., Griscioli, F., Lospoto, G., Mostafaei, H.,
Pizzonia, M., and Rimondini, M. (2017). Leverag-
ing SDN to Monitor Critical Infrastructure Networks
in a Smarter Way. In Proceedings of the IM 2017
- 2017 IFIP/IEEE International Symposium on Inte-
grated Network Management, pages 608–611, Piscat-
away, NJ. IEEE.
Kim, H. and Feamster, N. (2013). Improving Network Man-
agement with Software Defined Networking. IEEE
Communications Magazine, 51(2):114–119.
Koulouris, T., Casassa Mont, M. and Arnell, S. (2017).
SDN4S: Software Defined Networking for Security.
Report, Hewlett Packard Enterprise. Last accessed on
Dec, 2018.
Martins, J. S. B. and Campos, M. B. (2016). A Security
Architecture Proposal for Detection and Response to
Threats in SDN Networks. In Proceedings of the 2016
IEEE ANDESCON, pages 1–4, Piscataway, NJ. IEEE.
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar,
G., Peterson, L., Rexford, J., Shenker, S., and Turner,
J. (2008). OpenFlow: Enabling Innovation in Campus
Networks. ACM SIGCOMM Computer Communica-
tion Review, 38(2):69.
Medved, J., Varga, R., Tkacik, A., and Gray, K. (6/19/2014 -
6/19/2014). OpenDaylight: Towards a Model-Driven
SDN Controller architecture. In Proceeding of IEEE
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
326