Secure virtual network embedding to mitigate the risk of covert channel attacks

Zhiming Wang, Jiangxing Wu, Zehua Guo, Guozhen Cheng, Hongchao Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Abstract

Network virtualization is a double-edged sword that facilitates network innovation but may cause information leakage between virtual nodes coexisting on the same substrate node via covert channels. This paper represents the first attempt to consider risk-tolerant coexistence in virtual network embedding. We propose a secure virtual network embedding scheme to mitigate the risk of covert channel attacks. Simulation results show that our scheme improves the percentage of secure virtual nodes by 40%.

Original languageEnglish (US)
Title of host publication2016 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages144-145
Number of pages2
ISBN (Electronic)9781467399555
DOIs
StatePublished - Sep 6 2016
Event35th IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2016 - San Francisco, United States
Duration: Apr 10 2016Apr 14 2016

Publication series

NameProceedings - IEEE INFOCOM
Volume2016-September
ISSN (Print)0743-166X

Other

Other35th IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2016
Country/TerritoryUnited States
CitySan Francisco
Period4/10/164/14/16

Bibliographical note

Funding Information:
This work is supported by the National Basic Research Program (973 program) of China (2012CB315901, 2013CB329104), the National Natural Science Foundation of China (61372121, 61309020, 61572519, 61502530), and the National High-Tech Research and Development Program (863 Program) of China (2015AA016102, 2013AA013505).

Publisher Copyright:
© 2016 IEEE.

Copyright:
Copyright 2017 Elsevier B.V., All rights reserved.

Keywords

  • covert channel
  • risk-tolerant coexistence
  • security
  • virtual network embedding

Fingerprint

Dive into the research topics of 'Secure virtual network embedding to mitigate the risk of covert channel attacks'. Together they form a unique fingerprint.

Cite this