45 research outputs found
ANCHOR: logically-centralized security for Software-Defined Networks
While the centralization of SDN brought advantages such as a faster pace of
innovation, it also disrupted some of the natural defenses of traditional
architectures against different threats. The literature on SDN has mostly been
concerned with the functional side, despite some specific works concerning
non-functional properties like 'security' or 'dependability'. Though addressing
the latter in an ad-hoc, piecemeal way, may work, it will most likely lead to
efficiency and effectiveness problems. We claim that the enforcement of
non-functional properties as a pillar of SDN robustness calls for a systemic
approach. As a general concept, we propose ANCHOR, a subsystem architecture
that promotes the logical centralization of non-functional properties. To show
the effectiveness of the concept, we focus on 'security' in this paper: we
identify the current security gaps in SDNs and we populate the architecture
middleware with the appropriate security mechanisms, in a global and consistent
manner. Essential security mechanisms provided by anchor include reliable
entropy and resilient pseudo-random generators, and protocols for secure
registration and association of SDN devices. We claim and justify in the paper
that centralizing such mechanisms is key for their effectiveness, by allowing
us to: define and enforce global policies for those properties; reduce the
complexity of controllers and forwarding devices; ensure higher levels of
robustness for critical services; foster interoperability of the non-functional
property enforcement mechanisms; and promote the security and resilience of the
architecture itself. We discuss design and implementation aspects, and we prove
and evaluate our algorithms and mechanisms, including the formalisation of the
main protocols and the verification of their core security properties using the
Tamarin prover.Comment: 42 pages, 4 figures, 3 tables, 5 algorithms, 139 reference
The KISS principle in Software-Defined Networking: a framework for secure communications
Security is an increasingly fundamental requirement in Software-Defined Networking (SDN). However, the pace of adoption of secure mechanisms has been slow, which we estimate to be a consequence of the performance overhead of traditional solutions and of the complexity of their support infrastructure. To address these challenges we propose KISS, a secure SDN control plane communications architecture that includes innovative solutions in the context of key distribution and secure channel support. Core to our contribution is the integrated device verification value (iDVV), a deterministic but indistinguishablefrom-random secret code generation protocol that allows local but synchronized generation/verification of keys at both ends of the control channel, even on a per-message basis. We show that our solution, while offering the same security properties, outperforms reference alternatives, with performance improvements up to 30% over OpenSSL, and improvement in robustness based on a code footprint one order of magnitude smaller
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
Monero is one of the first and most popular cryptocurrencies
to address privacy issues of other crypto coins such as Bitcoin. Monero
has a market capitalization of over one billion US dollars, and is ranked
the 12th most valuable cryptocurrency on CoinMarketCap (17 April
2019). This digital coin provides different mechanisms to protect its users,
such as decoy keys or mixins to obfuscate transaction inputs. However, in
spite of the efforts to protect Monero’s users privacy, transaction tracing
attacks are still feasible. Our contribution is twofold. First, we propose
and evaluate a new traceability attack, called transaction flooding attack (FloodXMR).
Second, we present an analysis of thecosts required
for an attacker to conduct FloodXMR. We show how an attacker can take
advantage of Monero’s Bulletproof protocol, which reduces transaction
fees, to flood the network with his own transactions and, consequently,
remove mixins from transaction inputs. Assuming an attack timeframe
of 12 months, our findings show that an attacker can trace up to 47.63%
of the transaction inputs at a cost of just 1,746.53 USD. Moreover, we
show also that more than 90% of the inputs are affected by our tracing
algorithm
The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure
Security is an increasingly fundamental requirement in Software-Defined Networking (SDN). However, the pace of adoption of secure mechanisms has been slow, which we estimate to be a consequence of the performance overhead of traditional solutions and of the complexity of the support infrastructure required. As a first step to addressing these problems, we propose a modular secure SDN control plane communications architecture, KISS, with innovative solutions in the context of key distribution and secure channel support. A comparative analysis of the performance impact of essential security primitives guided our selection of basic primitives for KISS. We further propose iDVV, the integrated device verification value, a deterministic but indistinguishable-from-random secret code generation protocol, allowing the local but synchronized generation/verification of keys at both ends of the channel, even on a per-message basis. iDVV is expected to give an important contribution both to the robustness and simplification of the authentication and secure communication problems in SDN.
We show that our solution, while offering the same security properties, outperforms reference alternatives, with performance improvements up to 30% over OpenSSL, and improvement in robustness based on a code footprint one order of magnitude smaller. Finally, we also prove and test randomness of the proposed algorithms
The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure
Security is an increasingly fundamental requirement in Software-Defined Networking (SDN). However, the pace of adoption of secure mechanisms has been slow, which we estimate to be a consequence of the performance overhead of traditional solutions and of the complexity of the support infrastructure required. As a first step to addressing these problems, we propose a modular secure SDN control plane communications architecture, KISS, with innovative solutions in the context of key distribution and secure channel support. A comparative analysis of the performance impact of essential security primitives guided our selection of basic primitives for KISS. We further propose iDVV, the integrated device verification value, a deterministic but indistinguishable-from-random secret code generation protocol, allowing the local but synchronized generation/verification of keys at both ends of the channel, even on a per-message basis. iDVV is expected to give an important contribution both to the robustness and simplification of the authentication and secure communication problems in SDN.
We show that our solution, while offering the same security properties, outperforms reference alternatives, with performance improvements up to 30% over OpenSSL, and improvement in robustness based on a code footprint one order of magnitude smaller. Finally, we also prove and test randomness of the proposed algorithms
Software-Defined Networking: A Comprehensive Survey
peer reviewedThe Internet has led to the creation of a digital society, where (almost) everything is connected and is accessible from anywhere. However, despite their widespread adoption, traditional IP networks are complex and very hard to manage. It is both difficult to configure the network according to predefined policies, and to reconfigure it to respond to faults, load, and changes. To make matters even more difficult, current networks are also vertically integrated: the control and data planes are bundled together. Software-defined networking (SDN) is an emerging paradigm that promises to change this state of affairs, by breaking vertical integration, separating the network's control logic from the underlying routers and switches, promoting (logical) centralization of network control, and introducing the ability to program the network. The separation of concerns, introduced between the definition of network policies, their implementation in switching hardware, and the forwarding of traffic, is key to the desired flexibility: by breaking the network control problem into tractable pieces, SDN makes it easier to create and introduce new abstractions in networking, simplifying network management and facilitating network evolution. In this paper, we present a comprehensive survey on SDN. We start by introducing the motivation for SDN, explain its main concepts and how it differs from traditional networking, its roots, and the standardization activities regarding this novel paradigm. Next, we present the key building blocks of an SDN infrastructure using a bottom-up, layered approach. We provide an in-depth analysis of the hardware infrastructure, southbound and northbound application programming interfaces (APIs), network virtualization layers, network operating systems (SDN controllers), network programming languages, and network applications. We also look at cross-layer problems such as debugging and troubleshooting. In an effort to anticipate the future evolution of this - ew paradigm, we discuss the main ongoing research efforts and challenges of SDN. In particular, we address the design of switches and control platforms—with a focus on aspects such as resiliency, scalability, performance, security, and dependability—as well as new opportunities for carrier transport networks and cloud providers. Last but not least, we analyze the position of SDN as a key enabler of a software-defined environment
Towards Cloud-based Asynchronous Elasticity for Iterative HPC Applications
Elasticity is one of the key features of cloud computing. It allows applications to dynamically scale computing and storage resources, avoiding over- and under-provisioning. In high performance computing (HPC), initiatives are normally modeled to handle bag-of-tasks or key-value applications through a load balancer and a loosely-coupled set of virtual machine (VM) instances. In the joint-field of Message Passing Interface (MPI) and tightly-coupled HPC applications, we observe the need of rewriting source codes, previous knowledge of the application and/or stop-reconfigure-and-go approaches to address cloud elasticity. Besides, there are problems related to how profit this new feature in the HPC scope, since in MPI 2.0 applications the programmers need to handle communicators by themselves, and a sudden consolidation of a VM, together with a process, can compromise the entire execution. To address these issues, we propose a PaaS-based elasticity model, named AutoElastic. It acts as a middleware that allows iterative HPC applications to take advantage of dynamic resource provisioning of cloud infrastructures without any major modification. AutoElastic provides a new concept denoted here as asynchronous elasticity, i.e., it provides a framework to allow applications to either increase or decrease their computing resources without blocking the current execution. The feasibility of AutoElastic is demonstrated through a prototype that runs a CPU-bound numerical integration application on top of the OpenNebula middleware. The results showed the saving of about 3 min at each scaling out operations, emphasizing the contribution of the new concept on contexts where seconds are precious
Urnas Eletrônicas no Brasil: linha do tempo, evolução e falhas e desafios de segurança
Mesmo após anos de implantação e evolução do voto eletrônico, as urnas eletrônicas continuam sendo alvo crescente de crÃticas, tanto por parte de especialistas em segurança da informação quanto pela sociedade. Os principais desa os no uso desse tipo de urnas são garantir a transparência, a auditabilidade e a contabilidade do sistema de votação, ao mesmo tempo em que garante-se também a integridade, a confidencialidade e a privacidade dos votos. No sistema brasileiro, entretanto, os principais pontos criticados são exatamente apouca transparência e a restrita auditabilidade das urnas, que nos poucos casos em que foram concedidos à sociedade civil fora de perÃodos eleitorais, levaram a descobertas de falhas de segurança. Não é surpresa,portanto, que isso, somado à atual impossibilidade de se auditar os resultados eleitorais, coloque em cheque acontabilidade no sistema. Neste survey, nós apresentamos e analisamos a evolução dos sistemas de votação eletrônica com o objetivo de criar uma linha do tempo e discutir falhas de seguranças e desa os em aberto.Também identificamos e discutimos questões importantes a serem respondidas para que um sistema baseado em urnas eletrônicas possa, de fato, ser um dos principais mecanismos de eleição de representantes em uma democracia112112sem informaçãoEven after years of implementation and evolution of electronic voting, electronic ballot boxes continue to be a growing target for criticism, both by information security experts and by society. The main challenges in using this type of ballot box are to ensure the transparency, audibility, and reliability of the voting system, while also ensuring the integrity, confidentiality, and privacy of votes. In the Brazilian system, the main points criticized are exactly the lack of transparency and the limited auditability of the ballot boxes, which in the few cases in which they were granted to civil society outside electoral periods led to the discovery of security breaches. It is not surprising, therefore, that this, coupled with the current inability to audit the election results, puts in check the reliability in the system. In this survey, we present and analyze the evolution of electronic voting systems with the objective of creating a timeline and discussing security flaws and open challenges. We have also identified and discussed important questions to be answered so that an electronic ballot-based system may be one of the main mechanisms for electing representatives in a democracysem informaçã
When the optimal is not the best: parameter estimation in complex biological models
Background: The vast computational resources that became available during the
past decade enabled the development and simulation of increasingly complex
mathematical models of cancer growth. These models typically involve many free
parameters whose determination is a substantial obstacle to model development.
Direct measurement of biochemical parameters in vivo is often difficult and
sometimes impracticable, while fitting them under data-poor conditions may
result in biologically implausible values.
Results: We discuss different methodological approaches to estimate
parameters in complex biological models. We make use of the high computational
power of the Blue Gene technology to perform an extensive study of the
parameter space in a model of avascular tumor growth. We explicitly show that
the landscape of the cost function used to optimize the model to the data has a
very rugged surface in parameter space. This cost function has many local
minima with unrealistic solutions, including the global minimum corresponding
to the best fit.
Conclusions: The case studied in this paper shows one example in which model
parameters that optimally fit the data are not necessarily the best ones from a
biological point of view. To avoid force-fitting a model to a dataset, we
propose that the best model parameters should be found by choosing, among
suboptimal parameters, those that match criteria other than the ones used to
fit the model. We also conclude that the model, data and optimization approach
form a new complex system, and point to the need of a theory that addresses
this problem more generally
Evaluation of Max Pereira alar reconstruction technique modification in the total nasal reconstruction protocol of the Hospital of Clinics of Porto Alegre
Introduction: Nasal reconstruction is the oldest plastic surgery technique. The nasal anatomy is complex and requires an association of techniques for the restoration of function and adequate nasal esthetics. Pereira et al. described a technique that allows total nasal reconstruction of the alar cartilage through the use of an auricular cartilage graft, with minimal deformity secondary to the donor site. The objective of the present study is to present a modification, by Collares et al., of the technique described above, which allows the reconstruction of another anatomical region of the nose without increasing morbidity, and its insertion into the total nasal reconstruction protocol of Hospital de ClÃnicas of Porto Alegre.
Methods: A retrospective study was conducted. We evaluated technique modification in 10 patients who underwent total nasal reconstructions.
Results: After examining the 10 patients who were treated with the modified total nasal reconstruction protocol at the Hospital de ClÃnicas of Porto Alegre, we observed an improvement in the nose shape and internal nasal valve with preservation of function, without sequelae secondary to auricular graft removal.
Conclusion: In this case series, the modification of the Max Pereira technique resulted in adequate aesthetic-functional treatment when implemented in the total nasal reconstruction protocol of the Hospital de ClÃnicas of Porto Alegre, without increasing the morbidity in the donor area