计算机科学 ›› 2025, Vol. 52 ›› Issue (10): 328-335.doi: 10.11896/jsjkx.240800163
王鹏睿1, 胡宇翔1,2,3, 崔鹏帅1,2,3, 董永吉1,2,3, 夏计强1
WANG Pengrui1, HU Yuxiang1,2,3, CUI Pengshuai1,2,3, DONG Yongji1,2,3, XIA Jiqiang1
摘要: 现阶段SRv6(Segment Routing over IPv6)中,段标签(Segment Identifier,SID)设计为流量工程、安全认证等网络功能提供了可编程性。这些功能的实现依赖于数据平面中流表的精确匹配与执行,但当流表被恶意篡改或错误配置时,容易导致功能一致性问题的出现。而带内网络遥测(In-band Network Telemetry,INT)技术作为SDN场景中经典的具有可编程性的校验工具,可将二者天然结合。为此,提出了基于可编程数据平面的SRv6功能一致性验证机制(Programmable Data Plane Based Consistency Verification Mechanism for SRv6 Functional,SRv6FCV)。SRv6FCV采用数据平面可编程技术为探针包插入认证标识,首先依据监控需求动态地将SID转换为特定的INT元数据结构,然后构造探针报文注入并逐跳收集特定网络功能的流表执行信息,最后对遥测信息进行解析并基于符号执行算法完成功能一致性验证。仿真结果表明,SRv6FCV能够保证满足流表规则以及业务功能执行策略的一致性。相较于之前的研究,SRv6FCV在完成对网络功能一致性校验的基础上,拥有更低的运行开销,同时其校验时长也有显著缩短。
中图分类号:
[1]SUGIURAT,TAKAHASHI K,ICHIKAWA K,et al.Acar:An application-aware network routing system using SRv6[C]//2022 IEEE 19th Annual Consumer Communications & Networking Conference(CCNC).2022:751-752. [2]ZHENGQ,TANG S,CHEN B,et al.Highly-Efficient and Adaptive Network Monitoring:When INT Meets Segment Routing[J].IEEE Transactions on Network and Service Management,2021,18(3):2587-2597. [3]WEI W,ZHANG X,PAN P,et al.EPM-SR:efficient perfor-mance measurement framework for KPIs to support segment routing over IPv6 Network[C]//2022 IEEE 22nd International Conference on Communication Technology(ICCT).2022:1800-1805. [4]CHEN B,CHEN F,TANG S,et al.On Orchestration of Segment Routing and In-band Network Telemetry[J].IEEE Transactions on Network and Service Management,2023,20(4):4047-4060. [5]ZUO Q Y,CHEN M,ZHAO G S,et al.Openflow-based SDN technologies[J].Journal of Software,2013,24(5):1078-1097. [6]BIFULCO R,RÉTVÁRI G.A survey on the programmable data plane:Abstractions,architectures,and open problems[C]//Proceedings of the 19th IEEE International Conference on High Performance Switching and Routing(HPSR).IEEE,2018.1-7. [7]WANG X Y,HU A Q,FANG H.Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice[J].IET Information Security,2020,18(1):342-351. [8]DUTTA P,SUSILO W,DUONG D H,et al.Collusion-resistant identitybased proxy re-encryption:lattice-based constructions in standard model[J].Theoretical Computer Science,2021,871:16-29. [9]WANG X A,GE Y L,YANG X Y.PRE +:dual of proxy re-encryption and its application[J].International Journal of Web and Grid Services,2018,14(1):44-69. [10]SINGH K,RANGAN C P,AGRAWAL R,et al.Provably se-cure lattice based identity based unidirectional PRE and PRE + schemes[J].Journal of Information Security and Applications,2020,54(3/4):102569. [11]ATENIESE G,FU K,GREEN M,et al.Improved proxy re-encryption schemes with applications to secure distributed storage[J].ACM Trans on Information and System Security,2006,9(1):1-30. [12]GUO H,ZHANG Z F,XU J,et al.Non-transferable proxy reencryption[J].The Computer Journal,2019,62(4):490-506. [13]PEREÍNI P,KUŹNIAR M,AND KOSTIĆ D.Monocle:Dynamic,Fine-grained Data Plane Monitoring[C]//Proceedings of CoNEXT.2015:1-13. [14]TAN L,SU W,MIAO J,et al.FindINT:Detect and Locate the Lost in-Band Network Telemetry Packet[J].IEEE Networking Letters,2022,4(1):20-24. [15]MARQUES JA,GASPARY L P.Advancing Network Monitoring and Operation with In-band Network Telemetry and Data Plane Programmability[C]//NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium.2023:1-6. [16]LIU W,ZHANG X,FENG C,et al.Segment Routing based In-Band Network Telemetry in IPv6 over Optical Networks[C]//2024 2nd International Conference On Mobile Internet,Cloud Computing and Information Security(MICCIS).2024:125-129. [17]GENTRY C,PEIKERT C,VAIKUNTANATHAN V.How to use a short basis:trapdoors for hard lattices and new cryptographic constructions[C]//Proc. of the 40th ACM Symposium on Theory of Computing.2018:197-206. [18]WANG F H,HU Y P,JIA Y Y.Lattice-based signature scheme in the standard model[J].Journal of Xidian University,2012,39(4):57-61,119. [19]QIU L S,WANG L L,LIU J,et al.SRSV:Efficient Resource Reservation for Satellite Networks Based on Segment Routing[C]//2022 5th International Conference on Hot Information-Centric Networking(HotICN).2022:99-104. [20]WANG X Y,HU A Q,HAO F.Feasibility analysis of latticebased proxy re-encryption[C]//Proc. of the 17th International Conference on Cryptography,Security and Privacy.2017:12-16. [21]CHICA J C C,IMBACHI J C,VEGA J F B.Security in SDN:A comprehensive survey[J].Journal of Network and Computer Applications,2020,159:102595. |
|