Validating Security and Resiliency in Software Defined Networks for Smart Grids
Rakesh Kumar
DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING UNIVERSITY OF ILLINOIS, URBANA-CHAMPAIGN
Validating Security and Resiliency in Software Defined Networks for - - PowerPoint PPT Presentation
Validating Security and Resiliency in Software Defined Networks for Smart Grids Rakesh Kumar DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING UNIVERSITY OF ILLINOIS, URBANA-CHAMPAIGN Motivation 2 Security: Access Control In United
Validating Security and Resiliency in Software Defined Networks for Smart Grids
Rakesh Kumar
DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING UNIVERSITY OF ILLINOIS, URBANA-CHAMPAIGN
Motivation
2
Security: Access Control
to follow NERC CIP Standards.
– Utilities are periodically audited to secure their Electronic Security Perimeter (ESP)
3
Resiliency: Link/Device failure
rules
– Applications may not tolerate the delays incurred
corrective actions to provide seamless resilience
– Fast Failover Mechanism: Designed for small, predictable latency
4
Resiliency: Illustration
SCADA Controller Ethernet Relay
Software Defined Networking (SDN)
6
Controller communication protocol.
validation.
Validation using the SDN Architecture
7
Control Plane State Static Validation Network-wide Policy Policy Violations
Rest of the talk:
8
Life of a Packet in an OpenFlow 1.x switch
– Match – Instructions
9
Resilient Routing Policy (RRP) Specification
10
failures
– Connectivity – Isolation – Path Length – Link Avoidance
RRP Example
11
The policy specifies that:
a path that traverses no more than three switches in the topology.
link between Switch:3 and Switch:4.
Model
12
to perform incremental computation as events occur in the network
network on different levels of abstraction (i.e. switch and network-level)
(set of packet headers) that flows on the network
Port Graph
SDN is modeled as a directed graph.
traffic, it has:
13
Admitted Traffic Set (ATS)
SDN is able to carry from node p to node d.
from port p to destination d, via its successor s, thus:
comparing ATS before and after an event:
14
Design
reverse DFS on the port graphs.
represents whether the edge is active based
15
Constructing Switch Port Graphs
16
Constructing Network Port Graph
17
Initializing ATS(p, d)
18
Destination MAC: 2 Other Fields: Wildcards Destination MAC: 2 Other Fields: Wildcards Source MAC: 1 Destination MAC: 2 Other Fields: Wildcards Destination MAC: 2 Other Fields: Wildcards Destination MAC: 2 Other Fields: Wildcards
Evaluation Setup
mininet and Ryu:
– Two processor cores at 3.3 GHz – 16 GB RAM.
19
Microbenchmark
20
sustain failure of a single link
than the diameter of the network
Resilience in a substation network
21
now
Security for interconnected microgrids
22
Conclusion
requirements for an SDN by performing exhaustive packet flow analysis
computational gains
23