Zhiming Wang, Jiangxing Wu, Zehua Guo, Guozhen Cheng, Hong-chao Hu
{"title":"安全虚拟网络嵌入,降低隐蔽通道攻击的风险","authors":"Zhiming Wang, Jiangxing Wu, Zehua Guo, Guozhen Cheng, Hong-chao Hu","doi":"10.1109/INFCOMW.2016.7562061","DOIUrl":null,"url":null,"abstract":"Network virtualization is a double-edged sword that facilitates network innovation but may cause information leakage between virtual nodes coexisting on the same substrate node via covert channels. This paper represents the first attempt to consider risk-tolerant coexistence in virtual network embedding. We propose a secure virtual network embedding scheme to mitigate the risk of covert channel attacks. Simulation results show that our scheme improves the percentage of secure virtual nodes by 40%.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Secure virtual network embedding to mitigate the risk of covert channel attacks\",\"authors\":\"Zhiming Wang, Jiangxing Wu, Zehua Guo, Guozhen Cheng, Hong-chao Hu\",\"doi\":\"10.1109/INFCOMW.2016.7562061\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network virtualization is a double-edged sword that facilitates network innovation but may cause information leakage between virtual nodes coexisting on the same substrate node via covert channels. This paper represents the first attempt to consider risk-tolerant coexistence in virtual network embedding. We propose a secure virtual network embedding scheme to mitigate the risk of covert channel attacks. Simulation results show that our scheme improves the percentage of secure virtual nodes by 40%.\",\"PeriodicalId\":348177,\"journal\":{\"name\":\"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"volume\":\"81 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFCOMW.2016.7562061\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFCOMW.2016.7562061","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure virtual network embedding to mitigate the risk of covert channel attacks
Network virtualization is a double-edged sword that facilitates network innovation but may cause information leakage between virtual nodes coexisting on the same substrate node via covert channels. This paper represents the first attempt to consider risk-tolerant coexistence in virtual network embedding. We propose a secure virtual network embedding scheme to mitigate the risk of covert channel attacks. Simulation results show that our scheme improves the percentage of secure virtual nodes by 40%.